In which area of the screen can features and functions of Word be accessed?

Command
Ribbon
Scroll bar
Tab

Please Hurry!!!

Answers

Answer 1

Answer:

Toolbar

Explanation:

j don't know if you meant that instead of scroll bar, but tool bar is the answer

Answer 2

Answer:

scroll bar

Explanation:


Related Questions

What is the term for the psychology, reasoning, and history behind a character's reactions in certain situations?

Answers

There are a lot of factors in behavioral neuroscience. For starters, there are social-cultural influences and biological and psychological influences. You can operate on a social script ( an action made off of previously perceived scenarios)
Most teenagers operate off of social-cultural psychology, primarily because of propaganda on TV, family traditions, etc.
Psychological factors like cognition could serve as a trait for situations.
Biological traits like testosterone, bipolar disorder, etc. It can affect these situations.

Explain why Austin takes close-up pictures of whales and displays them in life-size? worth 50 points

Answers

The reason why Austin takes close - up pictures of and displays them in life - size is due to the fact that  he wants to give viewers an indelible view or opinion of what a whale is.

It also to give whales a background to bring out unexplored thought and emotion in a lot of ways that has been yet to pursued .

What are Whales?

This is known to be Animals that are said to be mostly distributed and have a lot of group of aquatic placental marine mammals.

They are known to belong to an informal grouping as they belong to the order Cetartiodactyla.

Learn more about pictures from

https://brainly.com/question/25938417

Look out for users with this photo.

Look out for users with this photo.

Answers

Answer:

why whats wrong with it

Explanation:

omg thank you someone just answered my question and they told me to go to the link for the answer but i knew it was a trick lol

depending on the jurisdiction, computer software programs may be afforded protection under either copyright law or patent law. T/F

Answers

True, depending on the jurisdiction, computer software programs may be afforded protection under either copyright law or patent law.

This means that in some legal systems, the software can be protected by copyright, while in others, it can be protected by patents. These protections help ensure that creators and developers maintain control over their work and can enforce their rights against unauthorized use.

Learn more about copyrights or patent law:https://brainly.com/question/29738132

#SPJ11

java code is a compiled language that creates binary code for a specific architecture and must be recompiled when moved to another machine

Answers

Yes, that is correct. Java code is compiled into bytecode that is specific to the architecture of the machine it is compiled on. When the Java code is moved to another machine with a different architecture, it needs to be recompiled to generate the appropriate bytecode for that machine. This is because the bytecode is not platform-specific, but rather is designed to run on any machine with a Java Virtual Machine (JVM) installed. Therefore, the bytecode needs to be generated specifically for each machine's architecture to ensure optimal performance and compatibility.

Learn more about Java: https://brainly.com/question/25458754

#SPJ11      

     

I need some help with this project. The picture of the assignment is above

I need some help with this project. The picture of the assignment is above

Answers

Answer:

sorry

Explanation:

you need to do this on your own Wahhabi

but if you sub to my you-tube channel at chris got ha,x i will help you out

On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!

Answers

Answer:

No i dont think you can i was searching on ios websites for info cause i dont own one but it doesnt seem like you can ive been searching for quite a while now doesnt look like it tho

100 POINTS. BAD ANSWERS WILL BE REPORTED. GOOD ANSWERS MARKED FOR BRAINLIEST. WON'T HESITATE TO REPOST.
Which of the following programs are command-line programs?

All programs written in IDLE
Programs that are called via CLI
Programs that are called via graphics
Programs that need GUI to execute

Answers

Answer:  The correct answer is Programs that are called via CLI

Explanation:  Command Line Interface applications (CLI) are typically used to call other CLI programs, batch files or command prompt executables. Command-line interfaces are also referred to as command-line user interfaces, console user interfaces, and character user interfaces, though their intended use varies. CLI input can be entered as input commands by the keyboard and then run by the computer.

Answer:

Programs that are called via CLI.

the other options are non-examples because they are a different category of programs (GUI, graphics, and IDLE).

30. Morgan is applying to four-year colleges and is 100% sure she wants to move away from home and live on-campus. One of her other priorities is minimizing the amount of student loan debt she’ll have at graduation. Give Morgan two recommendations on how to achieve that goal of low student loan debt.

Answers

Here are two recommendations for Morgan on how to minimize her student loan debt when attending a four-year college:

1. Choose a college major that is in demand and has good job prospects after graduation. This can increase the likelihood of finding a well-paying job after college, which can help to pay off any student loan debt more quickly. It's important to research which majors are in demand and have good job prospects, and to consider any personal interests or skills that can be applied to these majors.

2. Consider applying for scholarships and grants to help pay for college. These are sources of funding that do not need to be repaid, unlike student loans. Scholarships and grants can be based on a variety of factors such as academic merit, financial need, community involvement, and more. It's important to research and apply for as many scholarships and grants as possible to reduce the amount of student loan debt needed to pay for college.

Axton has a toy model of king kong from the movie. Based on the information on the packaging, the toy is in scale of the "real" version represented in the movie. If 2 centimeters on his toy represents 28 feet on the "real" king kong, and his toy is 15 centimeters tall, how large is the king kong supposed to be in "real life" in the movie?

Answers

Answer: 210 feet

Explanation: i got it on my test

Which address or combination of addresses does a Layer 3 switch use to make forwarding decisions?
IP address only
port address only
MAC address only
MAC and port addresses
MAC and IP addresses

Answers

A Layer 3 switch uses both the MAC address and IP address to make forwarding decisions.

In a Layer 3 switch, packets are forwarded based on the destination IP address in the packet header. The switch uses its routing table to determine the next-hop IP address or interface to forward the packet toward the destination. The routing table contains information about the available routes and the associated next-hop IP addresses or interfaces.

Once the next-hop IP address or interface is determined, the Layer 3 switch uses the MAC address of the next-hop device to forward the packet to the appropriate physical interface. The switch looks up the MAC address in its MAC address table, which maps MAC addresses to physical interfaces. If the MAC address is not already in the table, the switch sends an ARP (Address Resolution Protocol) request to obtain the MAC address.

In addition to using the MAC address for forwarding decisions, a Layer 3 switch may also use port addresses, which correspond to the physical interfaces on the switch. This can be useful for QoS (Quality of Service) or other traffic management features that prioritize or filter traffic based on the physical interface it is received on or transmitted from.

Overall, a Layer 3 switch uses a combination of the MAC address and IP address to make forwarding decisions, with the MAC address used for forwarding packets on the appropriate physical interface and the IP address used to determine the next-hop IP address or interface.

To learn more about addresses : https://brainly.com/question/31026862

#SPJ11

When working with large spreadsheets with many rows of data, it can be helpful to _____the data to better find, view, or manage subsets of data. Group of answer choices split sort and filter chart manipulate

Answers

When working with large spreadsheets with many rows of data, it can be helpful to split, sort, and filter the data to better manage subsets of information, enabling efficient data exploration, organization, and analysis.

Splitting the data involves dividing it into separate sections or sheets, which can be useful for organizing and categorizing different sets of information. This allows for easier navigation and analysis of specific portions of the data. Sorting the data involves arranging it in a specific order based on certain criteria, such as alphabetical order, numerical order, or chronological order. Sorting can help identify patterns, trends, or outliers within the dataset. Filtering the data involves applying specific criteria or conditions to display only the relevant information. This allows for focusing on specific subsets of data that meet certain criteria, making it easier to analyze or extract specific insights.

Learn more about rows of data here:

https://brainly.com/question/22257787

#SPJ11

A. Fallacy B. Proposition C. Conditional Statement D. Assumption E. Logical Reasoning F. Variable An element of a situation that has the potential to change in value. A B C D E F An element of a situation that is accepted as true without proof. A B C D E F The process of analyzing and evaluating arguments to draw a valid conclusion. A B C D E F A statement that is either true or false. A B C D E F A statement with an if-then structure that is either true or false. A B C D E F An argument based on an error in reasoning.

Answers

Answer:

A,B

Explanation:

its in the question......,....,...

Please help me i have a screenshot

Please help me i have a screenshot

Answers

Answer:

c

Explanation:

I did this too and I needed help so

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

I made Pico with a Ray Gun (Next is Dad/Tankman)

Opinons?

I made Pico with a Ray Gun (Next is Dad/Tankman)Opinons?

Answers

Answer:

It's cool!

Explanation:

Everything coalesces together perfectly! Despite the fact the boy and his ray gun are vastly different in style, I think it's cool overall! :)

Which of the following could be an example of a type of graphic organizer about jungle animals

A. A collection of photos with links to audio files of noises made by jungle animals

B. A paragraph describing different jungle animals

C. A picture of one jungle animal with no caption

D. A first person narrative about a safari

Answers

B) A paragraph describing different jungle animals

Answer:it’s a collection of photos with links blah blah blah

Explanation:just took it other guy is wrong

If you need to modify a features in a part created using the Mirror tool, you can make the change in the original feature and the feature on the other side of the mirror plane will be modified automatically.
Select Answer

False

True

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is TRUE.

Because when you are designing something and drawing anything and it is symmetric in shape and half of the part is created, then if you use mirror features, then the other half part will get created automatically.

If you need to modify the features in the original part of the drawing or design then the other side of the mirror plane will be modified automatically.

Because whatever you will make changes in the original part of the design, then the other part that is created by using mirror features will get modified automatically.  

if a payroll system continues to pay employees who have been terminated, control weaknesses most likely exist because programmed controls such as limit checks should have been built into the system. there were inadequate manual controls maintained outside the computer system. procedures were not implemented to verify and control the receipt by the computer processing department of all transactions prior to processing. input file label checking routines built into the programs were ignored by the operator.

Answers

The payroll system paying terminated employees indicates control weaknesses. To prevent this, programmed controls like limit checks should have been implemented.

This means that proper procedures were not in place to verify and control all transactions received by the computer processing department before processing them. Additionally, the operator ignored the input file label checking routines built into the programs.

These control weaknesses could result in payments being made to terminated employees, leading to financial losses for the company. To address these weaknesses, the following steps should be taken: Implement limit checks in the payroll system to ensure that payments are only made to active employees.

To know more about indicates visit:

https://brainly.com/question/33017327

#SPJ11

Brainly i know this is not educational question but why do you guys delete my answers for no reason one person said we love the rebelion in you but stick to the terms of use
and all i said was the answer and said hope this helps can you guys please make a real reason to delete my answers i hope you read this

jhofy thx brainly i like this app but will not use it if you keep doing this

Answers

Answer:

sry that happened to u hope it dosent happen again. Have an amazing day! Rememeber u are loved deeply :)

Answer:

sorry this is happening, brainly used to delete my answers for random reasons too.

Explanation:

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.

Answers

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture. Thus, option C is correct.

What is middleware?

Middleware can be defined as the process or a system through which the person can easily connect through different programs or systems. This helps in connectivity.

In the service-oriented architecture, it provides the basic need is a process for developing software that produces enterprise applications by using software elements known as services. Every service offers a particular management function, and applications can converse with one another across technologies of languages.

Therefore, option C is the correct option.

Learn more about Middleware, here:

https://brainly.com/question/13440971

#SPJ1

The question is incomplete, the complete question is:

a. cloud computing

b. rapid application development

c. service-oriented architecture

d. Software as a Service

The 4Ps model has been challenged because it omits or underemphasizes important activities such as services. It's also been criticized for taking a seller's, rather than a buyer's, viewpoint. The more recent 4As framework complements the traditional model and includes ________. Group of answer choices adaptability, affordability, availability and awareness adaptability, affordability, accessibility and awareness acceptability, affordability, accessibility and aptitude acceptability, affordability, accessibility and awareness adaptability, affordability, availability and aptitude

Answers

Answer:

acceptability, affordability, accessibility and awareness.

Explanation:

Marketing mix can be defined as the choices about product attributes, pricing, distribution, and communication strategy that a company blends and offer its targeted markets so as to produce a desired response.

Generally, a marketing mix is made up of the four (4) Ps;

1. Products: this is typically the goods and services that gives satisfaction to the customer's needs and wants. They are either tangible or intangible items.

2. Price: this represents the amount of money a customer buying goods and services are willing to pay for it.

3. Place: this represents the areas of distribution of these goods and services for easier access by the potential customers.

4. Promotions: for a good sales record or in order to increase the number of people buying a product and taking services, it is very important to have a good marketing communication such as advertising, sales promotion, direct marketing etc.

However, the 4P's model has been challenged because it omits or underemphasizes important activities such as services. It's also been criticized for taking a seller's, rather than a buyer's, viewpoint. The more recent 4As framework complements the traditional model and includes acceptability, affordability, accessibility and awareness.

The 4As framework helps business firms or companies to see all of its activities from the perspective of the customers and as such it enhances (facilitates) customer satisfaction and creates value.

Hence, for any business to be successful in its market campaigns, it must judiciously and effectively adopt the 4As framework.

What is digital graphics?
How are they used in the Entertainment Industry?
Why are they used in the Entertainment Industry?

Answers

Answer:

1) its what they use to make things

2)to make things like dinosaurs

3) it makes these things look real

Explanation:

Answer:

-Digital graphics combine text and images to produce a graphic product which cane used for s specific purpose. By using both writing and images they can present an idea or a message in an eye-catching and effective way. They can be printed or used onscreen.

-Digital graphics can simply be produce to entertain people.

-The graphics included in multimedia or game products are also obvious examples of graphics designed to entertain. Part of entertaining can be to grab the attention of potential readers so that they are more likely to think about buying the product.

A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amount of random access memory in a device determines how much memory the operating system and open applications can use. This type of memory is temporary and volatile.

options:

RAM


ROM


Optical storage


Hardware

Answers

The common hardware component found in electronic devices including desktop computers, laptops, tablets, and smartphones that fits the description is A)RAM .

RAM is an essential component in modern computing devices as it provides temporary storage for data and instructions that are actively being used by the operating system and open applications.

RAM is considered volatile memory because its contents are lost when the device is powered off or restarted.

Unlike non-volatile memory like Read-Only Memory (ROM) or storage devices such as hard drives or solid-state drives, RAM cannot retain data without a continuous power supply.

The amount of RAM in a device directly affects its performance and multitasking capabilities.

With more RAM, the operating system and applications have more space to store data, which allows for smoother and more efficient operation.

Insufficient RAM can lead to sluggish performance, frequent application crashes, and limitations on the number and size of applications that can be run simultaneously.

RAM works by providing fast and temporary storage for data that needs to be accessed quickly by the processor.

It allows for rapid read and write operations, enabling quick access to data and instructions during the execution of programs.

When an application is opened, its data is loaded into RAM, allowing for fast retrieval and processing by the CPU.

For more questions on RAM

https://brainly.com/question/28483224

#SPJ8

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

PRACTICE
.
3. Write a program asks the user to enter their first name and their last name, separated by a space.
Break the input string up into two strings, one containing the first name and one containing the last
name. You can do that by using the indexOf() subroutine to find the position of the space, and then
using substring0 to extract each of the two names. (should save each into its own variable)
• A sample run of the program should look something like this:
Please enter your first name and last name, separated by a space. ?
Mary Smith
Your first name is Mary.
Your last name is Smith.

(I am using Notepad)​

Answers

class Name

{

public static void main(String args[])

{

String name, firstName,lastName;

int blankIndex,fchar,lchar;

System.out.println("Enter your name having space between first name and last name");

Scanner in = new Scanner(System.in);

name= in.nextLine();

blankIndex = name.indexOf(' ');

firstName = name.substring(0,blankIndex-1);

lastName = name.substring(blankIndex+1, name.length()-1);

fchar = firstName.length();

lchar = lastName.lenght();

System.out.println("You entered the name"+name); Â Â

System.out.println("Your firstname is"+firstName+"has"+fchar+"characters" );

System.out.println("Your lastname is"+lastName+"has"+lchar+"characters" );

}

}

Think of a binary communication channel. It carries two types of signals denoted as 0 and 1. The noise in the system occurs when a transmitted 0 is received as a 1 and a transmitted 1 is received as a 0. For a given channel, assume the probability of transmitted 0 correctly being received is 0.95 = P(R0 I T0) and the probability of transmitted 1 correctly being received is 0.90 = P(R1 I T1). Also, the probability of transmitting a 0 is 0.45= P(T0). If a signal is sent, determine the
a. Probability that a 1 is received, P(R1)
b. Probability that a 0 is received, P(R0)
c. Probability that a 1 was transmitted given that a 1 was received
d. Probability that a 0 was transmitted given that a 0 was received
e. Probability of an error

Answers

The probability that a 1 is received, P(R1), is 0.1.The probability that a 0 is received, P(R0), is 0.55.The probability that a 1 was transmitted given that a 1 was received is 0.8182 (approximately).The probability that a 0 was transmitted given that a 0 was received is 0.8936 (approximately).The probability of an error is 0.1564 (approximately).

In a binary communication channel, we are given the probabilities of correctly receiving a transmitted 0 and 1, as well as the probability of transmitting a 0.

a. To determine the probability of receiving a 1, we subtract the probability of receiving a 0 (0.45) from 1, resulting in P(R1) = 1 - P(R0) = 1 - 0.45 = 0.55.

b. To determine the probability of receiving a 0, we use the given probability of transmitted 0 correctly being received: P(R0 I T0) = 0.95. Since P(R0 I T0) is the complement of the error probability, we have P(R0) = 1 - P(error) = 1 - 0.05 = 0.55.

c. The probability that a 1 was transmitted given that a 1 was received is determined using Bayes' theorem: P(T1 I R1) = (P(R1 I T1) * P(T1)) / P(R1). Substituting the given values, we have P(T1 I R1) = (0.9 * 0.55) / 0.55 = 0.9.

d. Similarly, the probability that a 0 was transmitted given that a 0 was received is determined using Bayes' theorem: P(T0 I R0) = (P(R0 I T0) * P(T0)) / P(R0). Substituting the given values, we have P(T0 I R0) = (0.95 * 0.45) / 0.55 = 0.8936 (approximately).

e. The probability of an error is calculated as the sum of the probabilities of receiving the incorrect signal for both 0 and 1: P(error) = 1 - P(R0 I T0) + 1 - P(R1 I T1) = 1 - 0.95 + 1 - 0.9 = 0.05 + 0.1 = 0.1564 (approximately).

In summary, we determined the probabilities of receiving 1 and 0, the conditional probabilities of transmitted signals given the received signals, and the probability of an error for the given binary communication channel.

Learn more about Probability

brainly.com/question/31828911

#SPJ11

Are there any incremented values from one loop to the next?

What variables may be used to track each loop in the program?

Answers

Answer:

You can place any expression you'd like in the final expression of the for loop, but it is typically used to update the counter variable.

counter variable is used throughout those parts. That variable keeps track of the current repetition, and is typically named i . The initialization part initializes the counter variable to a starting value.

Explanation:

for what work photoshop is used?

Answers

its for making commercials and background that look cool
Adobe Photoshop is a software used for editing photographs, compositing digital art, animating, and graphic design

Information system using the latest information technology has benefited which modern need?.

Answers

Information system using the latest information technology has benefited increased data security.

Give a brief account on data security.

Data security is the process of guarding digital data against unwanted access, corruption, and theft across all stages of its life. It is a notion that covers every facet of information security, including the logical security of software programs, administrative and access controls, and the physical security of hardware and storage devices. It also contains the policies and practices of the organization.

Strong data security measures, when correctly executed, will safeguard an organization's information assets from cybercriminal activities but they also guard against insider threats and human mistake, which continue to be among the top causes of data breaches in the present. Data security entails the use of tools and technology that increase an organization's awareness of where its crucial data is located and how it is being used. These solutions ought to be able to implement security measures like encryption, data masking, and redaction of sensitive files, as well as automate reporting to speed up audits and ensure compliance with legal standards.

To know more about, data security, visit :

https://brainly.com/question/14487203

#SPJ1

Other Questions
Would be helpful if someone gave an explanation also Why does Shere Khan stick his head into the mouth of Father Wolfs cave? The velocity of a car Travelling in the positive direction decreases from 36 m/s to 28 m/s in four seconds what is the average acceleration of the car in this process A van accelerates from a velocity of 2 m/s to a velocity of 20 m/s in 12 s.Calculate the acceleration of the van. IS ANYONE ELSE JUST GETTING PPL PUTTING LINKS WHEN U ASK A QUESTION??? A nurse is reviewing blood pressure classifications with a group of nurses at an in-service meeting. Which of the following should the nurse include as a risk factor for the development of HTN? MAKE CONNECTIONS Compare Figure 31.5 with Figure 13.6. In terms of haploidy versus diploidy, how do the life cycles of fungi and humans differ? The compostien figure of 8cm 5cm 12cm 2cm Graph the line that passes through the points (6,3) and (5,3) and determine the equation of the line. Graph the function y = (4 - x)(x + 2) in the coordinate plane. Martin used a coordinate plane to design the garden shown. Each unit on the grid represents 10 yards.How many yards of rope does Martin need to rope off the perimeter of the garden?Enter your answer in the box. Find the product: 114535114535. what were two negative effects of he Louisiana Purchase? NEED HELP ASAP, WILL GIVE BRAINLIESTPresident Roslin of Country XYZ knows that a new policy is needed to help solve the problem of rising unemployment in her nation. Her next step is todevelop a plan.implement a plan.identify the problem.solve the problem. The initial step of the six-step problem-solving model is to: A. Explore alternatives B. Develop an approach. C. Identify the problem. D. Clarify values. environmental degradation What is the difference between weight and mass? What is the average amount of time an American spends consuming media in a week?A. 10 hoursB. 18 hoursC. 22 hoursD. 28 hoursPlease collect the best answer from the choices providedHURRY!! What strategy did Martin Luther King Jr. defend in his letters from Birmingham Jail?working with southern politicians to reduce his sentencegoing on a hunger strike while in prisonorganizing nonviolent demonstrations and resistanceusing violence if it is in self-defense Explain how Quebecois French developed.