Commands are organized into tabs on the A. Ribbon. B. Quick Access toolbar. C. Status bar. D. ruler.

Answers

Answer 1
Commands are organized into tabs on the A. Ribbon
Answer 2

Commands are organized into tabs on the  Ribbon. Correct answer: A

The ribbon is a command bar at the top of a window which  includes series of tabs, each tab represents some program's feature.

Ribbon tabs are composed of groups, which are a labeled set of closely related commands.


Related Questions

(Java) Can anyone help me with this question ???

Answers

Your print function is too specific. It should be more like:

for( int i = 0; i < data.length; i++ )
    System.out.print( data[ i ] );


append() would be something like:

int[] c = new int[ a.length + b.length ];
int j = 0;
for( int i = 0; i < a.length; i++ )
    c[ i ] = a[ i ];

for( int i = j; i < ( b.length + a.length ); i++ )
    c[ i ] = b[ i ];
return( c );

which is not a factor that leads to technological advancement?

a) inflation rate

b) new methods

c) advanced devices

d) desire for productivity

Answers

The inflation rate is the rate of increase in aggregate prices (things becoming more expensive over time), primarily driven by an increase in the money supply. The effect of inflation on an economy is debatable, and can have positive and negative implications. It generally moves very closely with a growth in the money supply, so that real prices are not heavily affected by inflation in the long-run.
Inflation is not related to technological advancement, but the nominal change in prices. 

New methods, advanced devices, and firms' incentive to become more productive all logically contribute to more advanced technology. 

The answer is A) inflation rate

How can you differentiate between standard and protocol? Write at least on example of each of these terminologies?

Answers

Both protocol and standard define set of rules used by  two or more parties to interact between themselves.
The difference is that a standard is a formalized protocol accepted by most of the parties that implement it. Standards have exact and detailed specification regarding the network and define guidelines that specify the communication between the parties, 
Examples for protocols are: hyper-text transfer protocol (HTTP), file transfer protocol (FTP) ,transmission control protocol / internet protocol (TCP/IP)...
Examples for standards: IEEE 802.3, IEEE 802.7, IEEE 802.11,..

A pie chart with one more slices offset is referred to as a

Answers

A Pie Chart is what it is called

While a computer is running the operating system remains in memory. true or false?

Answers

While a computer is running the operating system remains in memory is true.

Sql server comes with a complete set of reference manuals and help information called ____________________________________.

Answers

The manuals are called "Books Online." These allow the user to better understand the functionality of SQL Server and how to create data management tools. In other terms, this is the "knowledge base" for SQL and how to effectively use it when creating databases.

What is Pseudo-code? Write a Pseudo-code to determine a student’s final grade and indicate whether it is passing or failing. The final grade is calculated as the average of five marks. (Passing criteria is Grade >=50 )

Answers

Pseudo-code is a method of outlining/designing a program before actually using the programming language to code it. Again, Pseudo-code is not the actual programming language but it can include keywords from the language itself along with general words to describe what the particular purpose of that code is for. For example, the Pseudo code for this example would be: 1.) Collect Students grades with I/O operation (either from file or from user) 2.) Get average of students grades, average is Students grades divided by 5. 3.) Use comparative operators in your language to check if average is greater than or equal to 50. 4.) Display Students passing/failing status with I/O operation. 5.) End program or repeat for next user.

If a ps/2 keyboard does not work on your system and yet you know the keyboard is good, what is the best solution?

Answers

Do you have drivers installed for that keyboard on your ps2?

The original amount of money you deposit in a savings account is called __

Answers

it is called principal 

The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
a. interleave
b. trackback
c. hyperlink
d. mash-up
e. folksonomy

Answers

mash-up, I believe, is the correct answer.

While it may be possible for rivals to match technology, the true exploitable resource created and leveraged through collaborative filtering technology is the data asset?

Answers

While it may be possible for rivals to match technology, the true exploitable resource created and leveraged through collaborative filtering technology is the data asset? The answer is True

1)
________________ is an abbreviation of advertising supported software and refers to anything that displays advertisements when using a computer, such as when browsing on the internet, or using a CD or DVD that contains adware.

Answers

Adware is an abbreviation of advertising support software and refers to anything that displays advertisements when using a computer, such as when browsing on the internet, or using a CD or DVD that contains adware

A _______ is used to analyze and summarize your data without graphical support.

Answers

Pivot table is the answer

Write a for loop to print all num_vals elements of array hourlytemp. separate elements with a comma and space. ex: if hourlytemp = {90, 92, 94, 95}, print: 90, 92, 94, 95 note that the last element is not followed by a comma, space, or newline.

Answers

import java.util.Scanner; public class PrintWithComma { public static void main (String [] args) { final int NUM_VALS = 4; int[] hourlyTemp = new int[NUM_VALS]; int i = 0; hourlyTemp[0] = 90; hourlyTemp[1] = 92; hourlyTemp[2] = 94; hourlyTemp[3] = 95; /* Answer */ System.out.println(""); return; } }

When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
Caps lock tab shift ctrl

Answers

The tab key moves the cursor to the next field in the tab order, which is set by the programmer.

Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning attack none of the above.

Answers

Sending packets with false IP source addresses is called IP address spoofing 

The programming interface between an application program and the dbms is usually provided by the

Answers

The Data Access API.

A technology _____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.
a. hierarchy
b. process
c. continuum
d. lockout
e. cycle

Answers

A technology cycle begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

The person who receives financial protection from a life insurance plan is called a:

Answers

The answer to this question is A. Beneficiary
Payer is the person who buy the insurance (not necessarily for themselves only, can be given to their family or friends). Insured can not only be a person, but it also can be an object (such as cars). And the giver is the company who provide the insurance service for the payer.
I believe it's called being a beneficiary.

Which of the following questions would be most helpful in determining the market structure of a specific market? A. How far are goods shipped? B. How similar are the products? C. How many people want to buy? D. How are the corporations organized?

Answers

B. how similar are the products?

Write a java program (non-gui preferred) that has a method named atomic(). demonstrate in the program how two threads can, sometimes, invoke atomic() concurrently. create a second version of the program in which the two threads cannot invoke atomic concurrently.

Answers

Let's create a static counter shared by the two threads. The atomic method will increment, then decrement the counter. If concurrent invocations happen, the counter may hit 2, otherwise it should be 1.

public class HelloRunnable implements Runnable {

    public static int counter = 0;

    public static void atomic() {
        int value = ++counter;
        System.out.printf("%d ", value);
        counter = value - 1;
    }
    
    public void run() {
        int iter = 0;
        while(iter++ < 1000) {
            atomic();
        }
    }

    public static void main(String[] args) {
        (new Thread(new HelloRunnable())).start();
        (new Thread(new HelloRunnable())).start();
    }
}

You'll see an irregular pattern of 1's and 2's. Now if you add the synchronized keyword to atomic(), it'll be 1's only, because only one thread will enter atomic() at a time.

ie.:

    public synchronized static void atomic() {

What type of malware is heavily dependent on a user in order to spread?
a. rootkit
b. virus
c. worm
d. trojan?

Answers

Hello There!

The correct answer is in fact B. Virus.

Hope This Helps You!
Good Luck :) 

- Hannah ❤

Malware analysis is used by incident responders and security experts to: Discover the origin of an attack. Sort incidents according to their severity. Boost the process of incident response's effectiveness. Thus, option B is correct.

What malware is dependent on a user in order to spread?

Clicking links in emails, messaging applications, or social network posts that lead to fraudulent websites. By hiding in the HTML of hijacked websites, sometimes known as drive-by downloads, viruses can be downloaded as soon as the page loads in your browser.

A file or piece of code that can almost perform whatever action an attacker desires can be delivered over a network and can infect, investigate, steal, or conduct. Additionally, there are many ways to infect computers due to the wide variety of viruses.

Therefore, using network drives or external hard drives that are infected with your device.

Learn more about malware here:

https://brainly.com/question/14276107

#SPJ2

The option of _____ displays a dialog box that provides all the different paste options.

Answers

In which application? When you right click usually you are provided the context menu in a large number of applications which provides cut, copy, & paste options amongst others.

What do you click to create a new presentation in Normal view? A. Section B. Blank Presentation C. Layout D. New Slide

Answers

B. Blank presentation, this way you have a normal view presentation but you can also add your own features.

The answer is B. Blank Presentation.  With this option, you are able to adjust the presentation to anyway you want to deliver it.

what is the difference between a router and a modem

Answers

A router is a device that allows numerous computers to join a network. A modem is a device that provides access to the Internet. 

Martin wants to calculate integer multiples up to 10 for a list of numbers. For example, he needs to multiply the first number in a list, list[0], by 1, 2, 3, etc., up to 10. What should he use?

Answers

A for loop.






----------------------------

Vaporization is the process in which liquid is sufficiently cooled to change states of matter from a liquid to a vapor true or false

Answers

Ans : The statement is False. Correct definition is Vaporization (or vapourisation) of an element or compound is a phase transition from the liquid phase to vapor. There are two types of vaporization: (1) evaporation and (2)boiling, not cooling. In the given question the statement is false. Evaporation is a surface phenomenon, whereas boiling is a bulk phenomenon.

Final answer:

The statement is false. Vaporization is the process in which a liquid is sufficiently heated, not cooled, to change states of matter from a liquid to a vapor.

Explanation:

Vaporization, also known as boiling or evaporation when below the boiling point, is the process where a liquid changes into a gas. This occurs when the molecules in a liquid gain enough energy to overcome the forces of attraction holding them together and enter the gaseous phase. Heat transfer from the surroundings to the liquid is necessary for vaporization to occur. On the other hand, condensation is the reverse process where a gas turns back into a liquid, which involves cooling and the release of heat to the surroundings. For example, when water boils, it reaches its vaporization temperature, allowing it to convert to a gas, with the amount of heat required described by the equation Q = mLv, where Lv is the latent heat of vaporization.

"1. how do you prevent unauthorized personnel from accessing your cisco device through the console port? "

Answers

The device should be physically protected. This means it should be located in special room (server room) in which access will have only authorized personnel. \
Second thing is to use password protection. With password protection everyone who wants to configure the CISCO device will have to authorize him/herself.
Final answer:

To prevent unauthorized access to a Cisco device through the console port, set a strong password and implement physical security measures to control access to the device.

Explanation:

To prevent unauthorized personnel from accessing your Cisco device through the console port, you should take several security measures. First, configure a password for console access. This can be done by entering the Cisco device’s global configuration mode, using the command line 'configure terminal', and then setting a password with 'line console 0' followed by 'password YOUR_PASSWORD' and 'login'.

Additionally, it's crucial to use a strong password that is both secure and easy to remember. Using a passphrase made up of a collection of words is a good practice, such as 'correcthorsebatterystaple', which is more secure than complex but shorter passwords.

Lastly, ensure that physical security measures are in place to restrict access to the device itself. This can involve keeping networking devices in locked rooms or cabinets, and maintaining a registry of authorized personnel who have physical access to these devices.

In Microsoft Word, when you highlight existing text you want to replace, you are in



A.automatic mode.

B.basic mode.

C.typeover mode.

D.insert mode.

Answers

The correct answer is C. Typeover mode

This is when you select a text and can then type over it and it automatically replaces it with what you're writing. It also creates a little box that lets you edit the selected part easily if that's what you need with things like bold or italic or change the text color.

Write the definition of a function add, that receives two int parameters and returns their sum. python

Answers

def Add(a, b):
    return a+b

Following are the method program to the given question:

Program Explanation:

Defining a method "add" that takes two integer variables "a,b" in the parameter.Inside the method, a return keyword is used that adds and return parameter value.Outside the method, two integer variable "a, b" is defined that use int with the input method to input value.After input value, a print method is defined that calls the method and prints its calculated value with the message.

Program:

def add(a,b):#defining a method add that takes two parameter  

   return a+b#using return keyword that adds parameter value

a=int(input("Enter first number: "))#defining integer variable a that inputs value

b=int(input("Enter second number: "))#defining integer variable b that inputs value

print('Sum: ',add(a,b))#using print method that calls method and prints its calculated value with message

Output:

Please find the attached file.

Learn more:

brainly.com/question/13314892

Other Questions
Which biome is characterized by frequent fires and rich soils? What is 89-9999-102 Espoused values are _____. for example, hewlett-packard stresses the "hp way," a collegial, egalitarian culture that gave as much authority and job security to employees as possible. BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! True or false is the transformation of chemical energy to radiant and thermal energy when a flashlight is turned on is an example of inefficiency Scientists have a theory that is accepted worldwide as the best explanation for the origin of the universe. a group of scientists have proposed a new theory about the origin of the universe. in your own words, explain the impact of the proposed theory on science. Create a table of data for two different linear functions. The table should use the same values of x for both functions. Based on your table, will the graphs of these two functions intersect? Explain your answer. 40 POINTS i reallyy need help in french, plz can someone help me legit, ill mark them the brainliest and give extra points with thanks on all thier questions!!!1.Choose the right form of the verb to complete the sentence:_________ calmes en classe! (3 points)treSoyezSommesSois2.Choose the correct sentence in plural form: (3 points)Il y a des salle de classes.Il y a des salles de classe.Il y a une salles de classe.Il y a des salles de classes.3.Choose the correct sentence in negative form: (3 points)Ce n'est pas un crayon.Ce ne est pas un crayon.C'est pas un crayon.Ce n'est un crayon.4.Choose the correct sentence in negative form: (3 points)Sois goste!Ne sois pas goste!Sois goste pas!Sois pas goste!5.Choose the answer to the following question:Est-ce que tu aimes jouer au foot? (3 points)Je joue au foot le matin.Je joue au foot en automne.Je n'aime pas jouer au foot.Je joue au foot avec mon frre.6.Choose the answer to the following question:Tu tudies en classe, n'est-ce pas? (3 points)Oui, je n'tudies pas.Non, tu n'tudies pas.Oui, beaucoup.Non, j'tudie en classe.7.Complete the sentence to explain who the family member is:La fille de ma tante est ma _____________. (3 points)soeurnicecousinetante8.Answer the question in French:You may copy and paste the accented characters from this list if needed: C'est le fils de mes grands-parents mais ce n'est pas mon pre, qui est-ce ? Mon . (5 points)9.Answer the question in French:You may copy and paste the accented characters from this list if needed: C'est la fille de ma grand-mre mais ce n'est pas ma mre, qui est-ce? Ma . (5 points)10.Look at the sentence and add the missing adjective:Elle est ______. (3 points)intelligentjolissnobpetit11.Look at the sentence and add the missing adjective:Ils sont __________. (3 points)richepetitessympasdsagrables12.Look at the sentence and add the missing adjective:Pierre et Martin sont ______________. (3 points)grandetimidesjolieadorable There are different types of cells for every job in the human body. Which statement is true about cells that develop differently? A. They are unidirectional. B. They are unorganized. C. They are specialized. D. They are usually damaged. Please Help!What clues tell the reader which point of view "The Yellow Wallpaper" by Charlotte Perkins Gilman is written in?A. Where the story takes placeB. Which pronouns are used C. What names are mentionedD. How paragraphs are structured Solve for the following equation 3+6z=13+6zA.z=-5/6B.z=2 2/3C.infinitely many solutionsD.no solution Svester rectangular gradeb is 28 m long and has an area of 392m what is the width of the garden Use ABC to find the value of sin B. Without a0, carbohydrates, fats, and proteins could not be changed into energy The receiving area of the brain for auditory impulses is in the What is it range of this data? {3,3,0,8,7,10,2,6,12,0} What does it mean for a girl to be stacked? Marie kept trying to recall the name of the new movie she wanted to see. although she'd seen the preview several times, she kept drawing a blank on the title. she had the sense that she knew the title, but she could not produce it at that moment. which type of forgetting was she experiencing? 2x + y = -2 x + y = 5 The x-coordinate of the solution to the system shown is _____. -7 -3 3 7 What phrase best applies to the academic fate of economically disadvantaged children? Steam Workshop Downloader