Answer:
Mailing tab
Explanation:
THIS IS THE COMPLETE QUESTION BELOW
To use mail merge features , use .................... tab on the Ribbon.
Tabs are been sectioned into groups,The groups under mailing tabs are utilized in performing steps needed for mail merge process. Mailing tab comes as fifth tab in the ribbon. This tabs enables the user to merge emails, preview results as well as writing and inserting different fields.
How many seconds are there in a year?
Answer:
31556926 Seconds
Explanation:
The stock room in the back has many items stored on very tall shelves. Some of these items weight
more than 40 pounds. What safety measures can you take to maintain a safe work environment?
who has a working card
Answer:
Me
Hgqgwgwvqbqbqhquququ
How do I log into PGCPS?
Answer: I don’t know sorry
Explanation:
What finger should be on the Y key?
1. Left Middle finger
2. Right Index finger
3. Left Index finger
4. Right Middle finger
Answer:
Right index
Explanation:
it's 2, right index finger
You are using Firefox as your
default browser and you want to customize it to better suit your browsing habits. What extensions specific to Firefox can
you use to accomplish this?
Answer:
B. firefox add-ons..............
How do you make someone Brainliest?
I have asked questions before and promised brainliest, but I don't actually know how. First person to tell me will get brainliest using my new skill! Please Help!
You are a manager and one of your team member ask why using slide presentations are a good idea. What’s the best way to respond
Answer:
tell them that the slides help u organize the info easly
so that the peaple/audience will understad
Explanation:
Answer: Slide presentations are familiar to most audiences, and will help them focus on the content.
Explanation: Got it correct on the quiz.
What is output by: print(len(stuff))
Answer:
5
Explanation:
The code print out the length of the string "stuff" which equals 5.
Which of the following is hardware or software that monitors and controls network traffic to prevent security breaches?
O trojan horse
O firewall
O anti-malware
O keylogger
Need answer now!!!!!
Answer:
Firewall
Explanation:
A trojan horse and keylogger are types of malware. While an anti-malware software may come with a firewall built in, the firewall is still the thing monitoring network traffic.
Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and then the others that are attached???
Please I really need help and it is due really soon!!!!!
Answer:
yes send me the worksheet
Explanation:
How many months have 28 days?
Answer:
All months of the year have at least 28 days, while February is the only month that is comprised of only 28 days (except for leap years)
Match the title of the work of fiction to the description given.
Answer:
Explanation:
Let's get the ones that there is no dispute.
Love and the Stars Romance
The Invisible Man Science Fiction
Treasure Island An Adventure
Call of the Wild An encounter with Nature
Reluctant Dragon Childhood story.
Here's the problem.
Most ten year olds are children. They likely would like both Call of the Wild and the Reluctant Dragon as well as Treasure Island.
The Reluctant Dragon could be called science fiction.
Answer:
your welcomeee
Explanation:
Why text tool is important while making an animation.
Answer:
Brief text animations are perfect for video intros, outros, transitions, short announcements, promos, and even quotes. Graphics that move in a multimedia project are called motion graphics. Some time ago, graphic design only existed in a still format.
Explain how you would filter the dog dataset using traversal to have a filtered list of dogs who live long lives.
Answer:
Explanation:
In such a dataset, the individual dogs that lived the longest lives would be at the deepest level of the data tree. Therefore, you would need to traverse the tree and grab all of the nodes at the deepest level and add them to a new list. This list will, therefore, have all the dogs that lived the longest lives. You would need to traverse the farthest left side of the tree until you reach the deepest node, then return and traverse the tree again on the left-right node to see if goes deeper. Once you reach the deepest node in each attempt you add it to the list.
Answer:
First, decide what counts as long lives (i.e. how many years it needs to live) then check for dogs where life span is <= that number. Then have the program remove all other dogs.
Explanation:
The most common delimiter is a
-forward slash
-period
-semicolon
-comma
Answer:
comma
Explanation:
trust me bro
The most common delimiter is a comma. The correct option is d.
What is a delimiter?
Programming languages employ delimiters to define code set characters or data strings, operate as data and code boundaries, and make it easier to comprehend code and divide up distinct implemented data sets and functions.
The values may be separated by any character, however, the comma, tab, and colon are the most often used delimiters. Space and the vertical bar, which is sometimes known as pipe, are occasionally utilized.
With one entry per row, data is organized in rows and columns in a delimited text file. Field separator characters are used to divide each column from the one after it. According to Comma Separated Value, one of the most popular delimiters is the comma.
Therefore, the correct option is d, comma.
To learn more about delimeter, refer to the link:
https://brainly.com/question/14970564
#SPJ2
What computer would I need to set up my oculus quest 2 aka make my oculus quest 2 link to a computer?
Answer:
Any computer would do as long as it isn't slow and has a good fps to render the games you plan to connect with. Make sure you have the correct cable though.
plzzz help ya girl out due soon
What is optical disc?
Answer:
hope this helps
Explanation:
An optical disc is a disc that allows you to play movies, music that is already prerecorded also it uses a laser light the read the data that is on the disc.
Answer:
An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam. Explanation:
Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Laura involved?
A.
analysis
B.
design
C.
development
D.
testing
E.
implementation
Answer:
answer is c
if my answer is wrong than sorry
PLEASE HURRY AND ANSWER
YOU WILL GET THE POINTS
Order the steps for creating additional calendars in Outlook 2016.
Click the New Calendar
Name the new calendar.
Click the Folder tab.
Place it in the Calendar folder
Open the Calendar view.
Answer:
1. Open the Calendar View
2. Click the folder Tab
3. Click the new calendar button
4. Name the New calendar
5. Place it in the Calendar Folder
Explanation:
I got it right.
(03.02 LC)
How is customer service defined? (6 points)
A.
Aid provided to the elderly by neighbors
B.
Assistance provided by a company to people who buy or use its products or services
C.
Help given to students by classmates
D.
Support given to employees by managers and supervisors
Answer:
B.
Assistance provided by a company to people who buy or use its products or services
B.
Assistance provided by a company to people who buy or use its products or services
What would happen if you fake a credit card number online on a website.
My 13 year old friend did that months ago and now he got a message saying his “chase account was locked due to suspicious activities”
I’m only asking because he’s freaking out
When you create two or four separate windows containing part of the spreadsheet that can be viewed, you have created
Sections
Panes
Views
Subsheets
Answer:
subsheet maybe i'm taking a test on it ill tell you if it is wrong lol i searched it up
Explanation:
i took the test it is right i probably was late but at least it got answered
When you create two or four separate windows containing part of the spreadsheet that can be viewed, you have created Panes. Thus, option B is correct.
What is a spreadsheet?Microsoft created and maintains the spreadsheet program referred to as Excel. You can carry out a wide range of tasks with Excel, including doing computations, creating columns, and creating charts. In addition, it assists with monitoring and data, market research, and sorting.
Go over to the Navigation pane to Frozen Panes to hold select columns or rows in lockdown or Divide Panes can generate multiple displays of a spreadsheet if you want to keep a portion of a spreadsheet accessible while scrolling to that other portion of the spreadsheet. Therefore, option B is the correct option.
Learn more about the spreadsheet, here:
https://brainly.com/question/8284022
#SPJ6
ANSWER ASAP!!!!!!!!!!!!!
Gregory Yob is associated with which of these games?
A.
Hunt the Wumpus
B.
Trek
C.
Akalabeth
D.
Ultima
E.
Life
can someone decode this into words or letters 71 194 38 1701
It doesn't mean anything, if this was binary code it would only have the numbers 0 and 1.
Answer:
gaaidchag a
Explanation:
i don't know what that means but i decoded it into letters i don't know if it's a sentence
What are three types of audio editing techniques?
Sound Forge, Audacity, and Pro Tools
burning, copying, and fading
non-destructive, destructive, and constructive
professional, open-source, and free
Answer:
non-destructive, destructive, and constructive
Explanation:
The three audio editing techniques involve sound forge, audacity, and pro tools. Thus, option A is correct.
What is audio editing?The audio editing is given as the change in the audio, volume, with the length, speed of the audio or other manipulations.
The audio editing is performed with the use of the software in the computer that enables the generation of the audio data.
The three types of audio editing techniques involves:
Sound Forge: It mediates the edit in the sound files with playback. Audacity: It is a free software that has been used for long with multi-track audio editor and recorder.Pro Tools: It enables the use of the view and edit of the track.Thus, option A is correct.
Learn more about audio editing, here:
https://brainly.com/question/24228690
#SPJ2
What are 5 characteristics of operating systems
Answer:
Memory Management.
Loading and Execution.
Data security.
Disk Management.
Process Management.
The basic characteristics of operating systems are Work Management, Memory Management, Input/output control, Process Management, and Resource Management.
What is an Operating System?Simply put, it is a computer program that helps computer operators effectively and efficiently use a computer without the need for coding or coding experience.
In summary, before the advent of operating systems, only programmers could use a computer, operating systems made it possible for everyone/anyone to use a computer.
Learn more about operating systems here:
https://brainly.com/question/1033563
#SPJ2
What is a mortgage?
O It is an unsecured loan used to purchase a car.
O It is a secured loan used to purchase a car.
O It is an unsecured loan used to purchase a home.
O It is a secured loan used to purchase a home.
Answer: It is a secured loan used to purchase a home.
Explanation: i took the test.......
what is the full form of CCTV
Answer:
CCTV stands for closed-circuit television