Which tab on the Ribbon contains the command to print a publication?

File

Home

Insert

Page Design

Answers

Answer 1

Answer:

File

Explanation:

Click on the File ribbon and find the print option.

Answer 2

Answer:

File is your answer =)

Explanation:


Related Questions

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?

A)Altered
B)Variable
C)Authentic
D)Player Adjusted

Answers

Answer: D. Player Adjusted

Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.

Have a nice day!

Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.

Answers

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

drive
eN
n
Complete the following calculations in your workbook.
What mechanical advantage does a hydraulic press have when punching
holes in a metal sheet with a force of 800 N using only 200 N? Provide your
answer as a ratio.
(3)
06 2. A hydraulic press has an input piston radius of 0,5 mm. It is linked to
an output piston that is three times that size. What mechanical advantage
does this press have?
(9)
3. A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N,
what effort is required to lift the weight? Provide your answer in newtons. (4)
4. Your deodorant sprays with a force of 15 N. What mechanical advantage is
achieved if your finger presses the deodorant nozzle with a force of 60 N?
Explain your answer.
(4)
[TOTAL: 20​

Answers

Answer:

uses goodgle

Explanation:

It 25 for 3 and 350n it 21n I hope this is the answer


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

How will future space flights be different for NASA?

Answers

Answer:

Explanation:

NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.

Answer:

NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...

Explanation:

NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.

Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

a) Realiza un esquema en planta del mecanismo.

b) Calcula n2 n3, n4. y la relación de transmisión.

c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

Answers

Answer:

a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4

     z1 = 10            z2 = 20              z3 =10            z4 = 20

b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm

   la relacion de transmision = 2

Explanation:

where z1 = 10, z2 = 20, z3 = 10, z4 = 20

and n1 = 1200 rpm

n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm

n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm

n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm

la relacion de transmision = z2/z1 * z3/z2 * z4/z3

= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

What is the error in the following line: (1)

age=int(input("Enter your age:")

Answers

Answer:

14

Explanation:

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

What is one similarity between compiled and interpreted programming languages? (5 points)

Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.

Both compiled and interpreted languages can be shared with others while keeping the source code private.

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

There are no similarities between compiled and interpreted programming languages.

Answers

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.

Match the elements used in web searches to their functions.

1. row
2. column
3. cell
4. worksheet

where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells

Answers

Row - horizontal
Column - vertical
Cell - where data and formulas can be entered
Worksheet - a grid of rows and columns

Answer:

where data and formulas can be entered - Cells

A grid of rows and columns - Worksheet

A horizontal set of cells - Row

A vertical set of cells - Column

Explanation:

I got it right on the Edmentum test.

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

A swimmer covers 180m in 20 seconds. How many metres does she swim in one second?​

Answers

Answer:

9 meters per second

Explanation:

180/20= 9

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files

Answers

Answer:

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

What is the definition of WLAN​

Answers

Explanation:

A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.

WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.

stay safe healthy and happy.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

Answers

Answer:

Premises

On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.

(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

What do you use the Pygame library for?

Answers

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.

Other Questions
V = 4p2Find V when p = 3 Coronado Company has the following equivalent units for July: materials 19000 and conversion costs 18800. Production cost data are: MaterialsConversion Work in process, July 1$ 7800 $ 2000 Costs added in July5300045000 The unit production costs for July are: Materials Conversion Costs If P= (2, 7) and Q= (2, -3), which could be the coordinates of R if triangle PQR is isosceles? In humans, hemophilia is a sex-linked recessive trait. If a male who has hemophilia marries a female withnormal blood clotting, what percent of the males will have the diseaseA- 0 males= 0% of the malesB- 1 male= 50% of the malesC- 2 males= 100% of the malesD- 3 males= 100% of the males What sub-region of Oceania is considered to be the most linguistically diverse area on Earth? Use the given scale factor and the side lengths of the scale drawing to determine the side lengths of the real object Sewe factor 31 21 in Scale drawing Object A. Side a is 24 inches long and side bis 21 inches long B. Side ais 63 inches long and side bis 54 inches long C. Side ais 7 inches long and side bis 6 inches long D. Side a is 18 inches long and side bis 15 inches long What do you know about contraceptives? please help me!!!!!! Find the measure of angle x.Xx =78 2. Stars normally convert hydrogen into helium through nuclear fusion. That requires incredibly hot temperatures and high pressure. At the moment, the temperature of empty space is nowhere near warm enough to fuse any elements together. What type of temperature and pressure conditions needed to be present in the early universe in order to create the first hydrogen atoms define human rights violation and state four factors that may contribute to incidents of human right violation in your community? Polygon B is a scaled copy of Polygon A using a scale factor of 5.How many times larger is the area of Polygon B than the area Polygon A? A train travels a distance of 120 km at a constant speed of V kmh 1. If the speedis reduced by 10kmh), then the time taken to the journey is increased by onehour. Find the constant speed V of train.Help me please Write the correct form of the preterit or imperfect tense.Mi familia y yo_(viajar) a Florida el ao pasado. Fill in the blanks:i) ___________________ is the outcome when there is pride inperformance. 5 points1. A rubber-band-powered toy car is loaded by pushing it backward untilthe rubber band inside is stretched tight. The child lets it go and therubber band turns the wheel, accelerating the car. The force that therubber band exerts on the axle is calle... *O A. Applied ForceB. Electromagnetic ForceC. Gravitational ForceD. Elastic Force 1. The length of side b equals the length of side c.2. The length of side b equals the length of side a.3. Side d is four times as long as side c.4. Side d is four times as long as side b. Rico has 2 plants. He buys 13 more.If he puts 3 plants in each row, how manyrows will he have? What value of x solves the equation 56/x = 8 (Trigonometry)(In image) What is the name of the molecule formed when two amino acids jointogether?O A. PeptideB. Nucleic acidC. AmineO D. Disaccharide