What are users unable to do in the user interface of PowerPoint 2016?

Add additional tabs on the ribbon.
Customize the default tabs on the ribbon.
Fully customize newly added tabs on the ribbon.
Use global options to customize newly added tabs on the ribbon.

Answers

Answer 1

Answer:

B. Customize the default tabs on the ribbon

The other answer is in correct

Explanation:

I took the unit test review and got 100%

edge 2020

Answer 2

it’s customize, just took the test :)


Related Questions

Identify which of the following statements is Correct.

A. The approximate number of possible networks in class B IPv4 is 126.
B. The first part of an IPv address identifies the host, and the last part identifies the network.
C. IPv4 is categorized into three classes.
D. A 32-bit IPv4 address is organized into four groups of 8 bits each.

Answers

The following statement is correct: "A 32-bit IPv4 address is organized into four groups of 8 bits each." (option D).

An Internet Protocol version 4 (IPv4) address is a 32-bit binary number that is frequently written in a dotted decimal format. It's a series of four 8-bit bytes or octets, with each octet separated by a period (.) that ranges from 0 to 255, e.g., 192.168.1.1.

IPv4 addresses are organized into four groups of 8 bits each, totaling 32 bits. The first part identifies the network address, and the second part identifies the host address. Network addresses and host addresses are both essential in routing IP packets to their intended destination on the Internet.

As a consequence, option D, "A 32-bit IPv4 address is organized into four groups of 8 bits each," is the correct answer. The other statements are incorrect because:In option A, the number of possible networks in class B IPv4 is 16,384, not 126. In option B, the first part of an IPv4 address identifies the network, while the second part identifies the host. In option C, IPv4 addresses are divided into five classes.

You can learn more about Internet Protocol version 4 at

https://brainly.com/question/24475479

#SPJ11

top secret mission lolz

Answers

Answer:

whats the mission about??

Explanation:

~evita

What were the requirements to be an accountant 15 years ago? And what are the requirements now.

Answers

Answer:

Back then:

The first step is to determine your state's educational requirements for taking the CPA Exam. Recent grads usually need to have earned 150 college credits in order to sit for the CPA Exam. After obtaining the required amount of college credits, many students enroll in a CPA Review course just prior to sitting for the CPA Exam.

Now:

Aspiring accountants need a bachelor's degree in accounting or business to begin work in the field. A bachelor's degree usually takes about four years and 120 credits to complete. Those with an associate degree might enter the field as bookkeepers or accounting clerks.

Explanation:

what permission must be granted for a user to run procedures within a database?

Answers

Answer:

To grant permissions on a stored procedure

From Stored Procedure Properties, select the Permissions page. To grant permissions to a user, database role, or application role, select Search. In Select Users or Roles, select Object Types to add or clear the users and roles you want.

Select the strategies below that are likely to increase audience attention. Vary the use of transitions for each slide. Avoid the use of animations. Use similar animation styles on each slide. Use consistent transitions. Use lots of different animation styles on each slide. Match special effects to content.

Answers

The strategies below that are likely to increase audience attention is vary the use of transitions for each slide. Thus, option A is correct.

Why effective attention is important?

An effective attention getter should always relate the topic to the audience and pique the audience's interest in the topic. In addition, for a speech to persuade, the attention getter should engage an audience beginning, for example, by asking a rhetorical question.

Use an interesting quote and ask a question that provokes thought in the reader, they could be rhetorical questions or just questions and answers. Humor if handled well, can be a wonderful attention getter.

Therefore, The strategies below that are likely to increase audience attention is vary the use of transitions for each slide. Thus, option A is correct.

Therefore, The strategies below that are likely to increase audience attention is vary the use of transitions for each slide. Thus, option A is correct.

Learn more about  strategies on:

https://brainly.com/question/15860574

#SPJ1

Please help me on this

Please help me on this

Answers

Runs application layer - proxy firewall
Monitors data packet - packet filter firewall
Examines network connections - state fuel inspection firewall

This is what is think.

The
indicates where the next text that you type will
appear.​

Answers

Answer: insertion point/Cursor

Explanation:

The cursor can also be referred to as the insertion point and it refers to the flashing vertical bar that can be seen on the screen and used to show where the texts that are entered will be placed.

The insertion point indicates where the next text that you type will appear. It refers to the location that can be found on the screen and here, the next character that's typed will be inserted.

Design a system for a book store that allows the owner to keep track of the store’s inventory and members. The store sells two types of products: books and CDs. The store offers two types memberships to customers: regular memberships and premium memberships. The regular membership is free, while the premium members pay a fee every month. For this reason, the store keeps track of payment method and whether the fee is paid on time for the premium members. The system should keep track of the members and how much money each has spent at the store. The system also keeps track of the inventory of each product. Inheritance: 1. Member is extended by premium members. 2. Product is sub-classes into books and CDs

Answers

A library's core administrative tasks are managed by a software program called a library management system. Systems for managing libraries' asset collections and interactions with patrons are essential.

Libraries can keep track of the books and their checkouts, as well as the subscriptions and profiles of members, thanks to library management systems.

The upkeep of the database used to enter new books and track borrowed books with their due dates is another aspect of library management systems.

The core component of the organization for which this software has been created is the library. It features characteristics like "Name" to set it apart from other libraries and "Address" to specify where it located. Book: The fundamental element of the framework. Each book will be identified by its ISBN, title, subject, publishers, etc.

Learn more about Library here-

https://brainly.com/question/14006268

#SPJ4

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

In which number system do the digital computer work​

Answers

The numbers that are operated on by a digital computer is known as the binary number system; binary digits, or bits. These are 0's and 1's.

Which network protocol allows administrators to access a remote computer in a secure way?

Answers

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

What is Secure Shell ?

The Secure Shell Protocol (SSH) is a cryptographic network protocol that allows network services to be operated securely over an unsecured network. Remote login and command-line execution are two of its most notable applications. SSH applications use a client-server architecture to connect an SSH client to an SSH server.

SSH is a layered protocol suite that consists of three major hierarchical components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into multiple logical communication channels.

SSH was created on Unix-like operating systems to replace Telnet and unsecured remote Unix shell protocols like the Berkeley Remote Shell and the related rlogin and rexec protocols, which all use insecure, plaintext authentication token transmission.

To learn more about Secure Shell refer :

https://brainly.com/question/17465910

#SPJ1

What existed before the universe?​

Answers

Explanation:

The initial singularity is a singularity predicted by some models of the Big Bang theory to have existed before the Big Bang and thought to have contained all the energy and spacetime of the Universe.

Hey there!

The answer is: "Initial Singularity"

"Initial Singularity" existed before the universe. It was predicted by some Big Bang theory models.

Hope it help you

subtract each element in origlist with the corresponding value in offsetamount. print each difference followed by a space. ex: if the input is: 4 5 10 12 2 4 7 3 the output is: 2 1 3 9. import java.util.Scanner;
public class VectorElementOperations {
public static void main (String [] args) {
final int NUM_VALS = 4;
int[] origList = new int[NUM_VALS];
int[] offsetAmount = new int[NUM_VALS];
int i;

Answers

The following is the Java code that subtracts each element in origlist with the corresponding value in offsetamount and prints each difference followed by a space. Example of Java code:

import java.util.Scanner;

public class VectorElementOperations

{

     public static void main (String [] args)

      {  

           final int NUM_VALS = 4;

           int[] origList = new int[NUM_VALS];  

           int[] offsetAmount = new int[NUM_VALS];  

           int i;  

           Scanner scnr = new Scanner(System.in);

            for (i = 0; i < origList.length; ++i)

           {  

                  origList[i] = scnr.nextInt();  

            }    

           for (i = 0; i < offsetAmount.length; ++i)

           {    

              offsetAmount[i] = scnr.nextInt();    

           }  

          for (i = 0; i < origList.length; ++i) {    

           System.out.print((origList[i] - offsetAmount[i]) + " ");    

         }

   }

}

-The Scanner class is used to read input from the user.

-The code prompts the user to input the values in the two arrays origList and offsetAmount.

-It then subtracts each element in origlist with the corresponding value in offsetamount.

-It prints each difference followed by a space.

Learn more about the Scanner class here: https://brainly.com/question/29640971

#SPJ11

7 (a) What is the function of the following combination of keys? CTRL + A i CTRL + Page Up v. CTRL + E vii. CTRL + F viii. CTRL + SHIFT HOME lain the role/use of the following features in a word processor (1) iv. CTRL+B CTRL + Home. vi. CTRL + Z (4 marks) Correct​

Answers

Keyboard shortcuts are keys or key combinations that offer an alternative method of performing tasks that you would ordinarily perform with a mouse.

What is the function of shortcut key?Using shortcut keys in computer applications can help you navigate and carry out tasks more quickly and easily. Alt (on IBM-compatible computers), Command (on Apple computers), Ctrl, or Shift combined with another key is used to execute shortcut keys.The name "shortcut" comes from the fact that keyboard shortcuts are frequently used to speed up routine tasks by condensing input sequences to a few keystrokes. Most keyboard shortcuts require the user to press and hold a number of keys simultaneously or a series of keys one after another in order to distinguish them from regular keyboard input.Keyboard shortcuts are stringed-together keystrokes that let you complete a task fast. They are helpful and frequently excellent time savings.

Given shortcuts :

CTRL + A = Select all document content.

CTRL + Page Up = Move to the previous sheet in the workbook.

CTRL + E =  Aligns the line or selected text to the center of the screen.

CTRL + F = To find a word or words on a page.

CTRL + SHIFT HOME = highlights all text from the current position to the beginning of the text or page.

CTRL + Z  = undo an action

Learn more about shortcut key refer to :

https://brainly.com/question/14447287

#SPJ1

When students have computer trouble they usually are expected to *limited time help*​

When students have computer trouble they usually are expected to *limited time help*

Answers

Answer:

A.

Explanation:

Answer:

a

Explanation:

i just did the quiz

Chris needs to modify the default bullets that are used in a non numbered list in word which method should he use

Answers

Answer:A

Explanation: just took the test

Answer:

(A) Select the arrow next to the bullet list option in the Paragraph group

Explanation:

Terrance is looking for a storage device to be used for backup storage. The device has to have a large storage capacity and be portable. What is the best device for Terrance's needs?

External hard drive
Disk drive
Hard drive
USB flash drive

Answers

Answer:

its external hard drive  and flash drive

Your welcome

Explanation:

12. Which of the following
are effective components of
good feedback?
Detailed and time consuming
O Direct and honest
o specific
O Band C both answers​

Answers

Answer:

Concept: Engineering Principles & Ethics

To give good feedback you must address characteristic that are reflective of the group assignment Hence it must be Direct, honest, and specific.Avoid being general, beating around the bush and providing half honest answers as it doesn't help the other person grow as a effective leader.

What is the main difference between structured and unstructured data?

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Which of the following numbers might this code generate: random.randint(1,9)?

0
10
11
1

Answers

Answer:

1

Explanation:

In Python programming language, the random.randint function is an abbreviation for random integers.

Basically, the random.randint is used for generating or creating a random integer numbers.

The syntax for this code can be written as;

A = random.randint(1,9)

Print ("Random number between 1 and 9 is % s" % (A))

Note, the numbers between 1 and 9 are 1, 2, 3, 4, 5, 6, 7, 8 and 9.

From the answer choices given (0, 1, 10 and 11), the only number that matches the requirement is 1.

Therefore, the number this code random.randint (1,9) might generate is 1.

what is the extension of a Microsoft access database 2013​

Answers

Answer:

Access Database (2007, 2010, 2013, 2016)..accdb

Answer:

.accdb

Explanation:

.accdb is the extension of Microsoft Access Database 2013

providing array values is sometimes called ____. group of answer choices creating the array declaring the array accumulating the array populating the array

Answers

Providing array values is sometimes called populating the array.

What is an Array?

An array is a set of values that are arranged in a systematic manner. An array is simply a collection of similar data types. It is a container object that contains a fixed number of data values of the same type. In the order specified, the values in an array are saved. An array can be one-dimensional or multidimensional, and it can contain values of any data type.

Populating the array is a process of adding data elements to the array's cells. The process of storing data values into an array is referred to as populating the array. You can populate an array either by assigning values to each element of the array one by one or by using a loop or a function to populate the array. Therefore, providing array values is sometimes called populating the array.

Learn more about array at

https://brainly.com/question/31043152

#SPJ11

Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

Answers

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

in this challenge the task is to implement a function manipulate student record that :
takes 4 arguments : an object literal obj, a string operation that is either 'delete' or 'edit', a string prop, and a string newValue and returns a value

Answers

To implement the function manipulateStudentRecord, we first need to determine what operation we are performing. If the operation is 'delete', we simply need to delete the specified property from the object.

If the operation is 'edit', we need to update the specified property with the new value. We can do this using the delete operator and bracket notation, respectively.

Here is the implementation in JavaScript:

```javascript

function manipulateStudentRecord(obj, operation, prop, newValue) {
 // Determine the operation
 if (operation === 'delete') {
   // Delete the specified property
   delete obj[prop];
 } else if (operation === 'edit') {
   // Update the specified property with the new value
   obj[prop] = newValue;
 }

 // Return the updated object
 return obj;
}
```

Here is an example usage:

```javascript

// Create an object literal
var student = {
 name: 'John',
 age: 16,
 grade: 'A'
};

// Delete the 'age' property
manipulateStudentRecord(student, 'delete', 'age');

// Edit the 'grade' property
manipulateStudentRecord(student, 'edit', 'grade', 'B');

// The updated object
console.log(student);
// Output: { name: 'John', grade: 'B' }
```

Learn more about programming:

https://brainly.com/question/26134656

#SPJ11

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction?

Answers

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction is option c. Add M[4], M[5], M[6].

What is high-level program referred to as?

High-level languages are set up to act or be close to be used by the human operator or any kind of programmer.

Note that they are seen to as "closer to humans." based on the fact that their context is easier to know and implement  and as such, The high-level program instruction a = b + c is most likely to be translated to which assembly instruction is option c. Add M[4], M[5], M[6].

Learn more about high-level program from

https://brainly.com/question/22695199

#SPJ1

See full question below

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction?

a. Add M[4]

b. Add M[4], M[5]

c. Add M[4], M[5], M[6]

d. Add M[4], M[5], M[6], M[7]

how has the dependence on technology made humanity less intelligent?​

Answers

Answer:

People now rely on the internet for answers.

Nobody truly learns stuff and keeps it with them anymore. They know they can just search it again, and get the answer.

what is the relationship between http and www?​

Answers

Answer:

The very first part of the web address (before the “www”) indicates whether the site uses HTTP or HTTPS protocols. So, to recap, the difference between HTTP vs HTTPS is simply the presence of an SSL certificate. HTTP doesn't have SSL and HTTPS has SSL, which encrypts your information so your connections are secured.

Answer:

Simply put, Http is the protocol that enables communication online, transferring data from one machine to another. Www is the set of linked hypertext documents that can be viewed on web browsers

Explanation:

please tell me what I did incorrect

40 points

please

i really need it

please tell me what I did incorrect40 points please i really need it

Answers

you put a semi colon in your inputs

if you liked this response, please rate thanks and award brainliest

hope this helped :)

given the following lines of code, what will be the output, i.e., the value of *(ptr 3)? int intarray[8] ={121, -21, 5, 103, 71, 11, 101, 99}; int *ptr = &intarray[3];

Answers

Based on the given code, the output or the value of *(ptr + 3) will be 11.

Explanation of the first two lines of code followed by a step-by-step explanation of how the output *(ptr + 3) is calculated:

int intarray[8] = {121, -21, 5, 103, 71, 11, 101, 99}; initializes an array named intarray with 8 integer elements: 121, -21, 5, 103, 71, 11, 101, and 99.

int *ptr = &intarray[3]; creates a pointer named ptr that points to the address of the fourth element in the array (intarray[3], which has a value of 103).

Now, let's move on to the explanation of how the output *(ptr + 3) is calculated:

*(ptr + 3) means "the value of the element 3 positions after the element pointed to by ptr."

Since ptr points to intarray[3], *(ptr + 3) will point to intarray[6] which has a value of 11.

To be more specific, ptr + 3 calculates the memory address of the fourth element after the element pointed to by ptr, which is intarray[6]. And by dereferencing the pointer with *(ptr + 3), we get the value stored in intarray[6], which is 11.

So the output or the value of *(ptr + 3) will be 11.

Know more about the pointer click here:

https://brainly.com/question/19570024

#SPJ11

Other Questions
How were Free People of Color treated in Louisiana's constitution of 1812? Part 1 The figure shows a claw hammer as it pulls anail out of a horizontal board. If a force of magnitude 133 N is exertedhorizontally as shown, find the force exertedby the hammer claws on the nail. (Assumethat the force the hammer exerts on the nailis parallel to the nail).Answer in units of NPart 2 Find the force exerted by the surface on thepoint of contact with the hammer head. Assume that the force the hammer exerts on thenail is parallel to the nail.Answer in units of N. Evaluate expression if x=2 y=3 z=4 6xz + 5xy Which passage from Chapter 4 of Botchan contains flashback?The making of this bumping noise when I go to bed is my habit from my boyhood. 'It is a bad habit,' once declared a student of a law school who lived on the ground floor, and I on the second, when I was in the boarding house at Ogawa-machi, Kanda-ku, and who brought complaints to my room in person. What were THREE major sporting events and the dates they took place in the 1960s How many grams of mgo are produced by the reaction of 25. 0 g of mg with 25. 0 g of o2? If AM = MB, then AM + 5 = MB + 5.which property dependent clauseDoes the following sentence contain a prepositional phrase or adependent clause? Under the table, Scooter felt safe and welcome. *O prepositional phrasedependent clause Determine the length of side BD in the triangle below.121513DB Cut two 3-by-12 inch strips of material from the nylon stocking. Place both strips on a piece of white paper and rub them briskly in your hand. With your fingers, lift the two pieces of nylon and hold them side by side. What happens and why? What electrical charge is present on the nylon strips? NEED HELP ASAP, WILL GIVE BRAINLIESTPresident Roslin of Country XYZ knows that a new policy is needed to help solve the problem of rising unemployment in her nation. Her next step is todevelop a plan.implement a plan.identify the problem.solve the problem. Define propagation of sound 21.Which of the following contain the molecules with the highest average speed?CL G Gicocubeat -10Cwaterat roontemperaturewoodat roomtemperaturesteamat 110C uninsured motorists coverage group of answer choices can be purchased by uninsured drivers after an accident to retroactively cover their losses. will not provide coverage if the other driver's insurance company is insolvent. will cover injuries caused by a hit-and-run driver. all of the above are true. 200 word essay on save environmaent MY LAST POST 50 POINTS The energy level where an electron is located, is shown by the ______ on the periodic table Question 9 of 13Given the line of best fit for a set of data points with the equation y = 5x - 2.5,what is the residual for the point (3, 6)?A. -6.5SUBMITOB. -6C. 6.5OD. 6 Sam aims to run a total of 18 miles in 5 weeks. He ran 2 miles in the first week, 3 miles in the second week, 5 miles in week three, and 2 miles in week four. How many more miles would he need to complete to reach his target? PLEASE HELP!!! IT WOULD MEAN A LOT!