Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change? status bar quick access toolbar title bar home tab?

Answers

Answer 1
The answer is the Quick Access Toolbar. However, it is not only for saving files or undoing your work. Containing a set of commands that are independent, this toolbar is actually customizable wherein you could change these icons to the ones you really need and frequently use. By tweaking the settings, you can even add commands to the Quick Access Toolbar that are not in the ribbon (like New, Open and Print).
Answer 2

The element of the word program window containing buttons for saving a document and for undoing, redoing, and repeating a change is the quick access toolbar. The correct option is b.

What is the quick access toolbar?

The Quick Access toolbar, which has buttons for saving a document and undoing, redoing, and repeating a change, is located on the left side of the title bar. In Microsoft 365 programs, the toolbar is normally hidden beneath the ribbon, but you can choose to reveal it and move it to appear above the ribbon.

The icons on this toolbar can be changed to reflect the ones you actually need and commonly use. You can also add Quick Access Toolbar instructions that are not in the ribbon by adjusting the parameters.

Therefore, the correct option is b, the quick access toolbar.

To learn more about the quick-access toolbar, refer to the link:

https://brainly.com/question/17441291

#SPJ6


Related Questions

What would a good digital citizen do in the following situation? Nick sees that his classmate left her email account open on a school computer by mistake. Nick decides to _____.

Question 1 options:

send an email from her account to a friend


log out of her email and let her know that he closed it for her


not do anything and let someone else deal with it


delete all of her emails

Answers

1234567898765432123456789876543212345678987654321

. The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turning on the built-in switch. D. setting the thermostat knob.

Answers

In order for the toasting cycle of an automatic toaster to start, the bread rack should be pushed down.

Answer: A 

Hope that helps! ★ If you have further questions about this question or need more help, feel free to comment below or leave me a PM. -UnicornFudge aka Nadia
D. setting the thermostat knob.

A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplicates the original or interfaces with the program.

Answers

The answer to the above question is a decompiler would be used for that application. Decompilers use executable file as input. They then create a source code that can be recompiled and put back together fairly easily. Due to a decompilers ability to break down original code, that original code can then be used to either duplicate the program, or re-engineer a program that would work in concert with the original program.

A user reports that she can't access the new server used in the accounting department. you check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the internet.

Answers

Missing route on the default gateway router.

The phase of hacking where the attacker creates a profile of the target is known as ________________ and is also referred to as _______________.

Answers

The stage of hacking where the attacker constructs a profile of the target is recognized as Foot-printing and is also referred to as reconnaissance. Reconnaissance is perhaps the extensive phase that is occasionally weeks or months. The black hat uses a diversity of causes to learn as much as likely about the target business and how it functions as well as internet searches, social engineering, dumpster diving, domain name management or search services and non-intrusive network scanning. The undertakings in this phase are not easy to protect against. Facts about an organization find its method to the internet via many routes and employees are often trapped into providing tidbits data which over time, act to complete a complete picture of procedures, organizational arrangement and possible soft spots. 

What character is used to separate the sheet name from the cell address within a formula containing a sheet reference?

Answers

The character used to separate the sheet name from the cell addres within a formula containing a sheet reference is !

For example:

Formula without sheet reference: = A1.

Formula with reference to another sheet in the same book: = Sheet1!A1

Formula with reference to a sheet in other book: = ='[Name_of_the_sheet]'!A1

That character is inserted automately so you do not have to write it.

Answer:

! or an Exclamation point

Explanation:

Just did the instruction on Edge 2021

Plz click the Thanks button!

<Jayla>

What term describes a dedicated device or computer that can control several printers connected to a network?

Answers

the answer is "server"

How many buttons does a gamecube controller have?

Answers

a gamecube has 11 different buttons on a controller.

Answer:

6

Explanation:

A prosthetic device is being coded on an electronic transaction. which code set should be used?

Answers

The Healthcare Common Procedure Coding System (HCPCS) should be used for coding of a prosthetic device on an electronic transaction. HCPCS is a code sets, used to code medical items such as medical supplies, orthotic and prosthetic devices, and durable medical equipment and is based on the American Medical Association's Current Procedural Terminology (CPT).

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

Broadband is a communication channel in which several users can simultaneously use a single connection for high-speed data transfer. The broadband communication channel has wide bandwidth, which means that it can transport data with high rates.  It is referred as high-speed Internet access and provides data transmissions in different directions and by many different users.

A utility program that copies all files in the libraries, contacts, and favorites and on the desktop:

Answers

A collection of related pieces of information stored together for easy reference.
If my memory serves me well, a utility program that copies all files in the libraries, contacts, and favorites and on the desktop is called File History. Every operating system including Linux and Chrome OS has this kind of utility to maintain files in the clipboard. 

What is the difference between a numbered list and a checklist?

Answers

Numbered lists require that things be done in a certain order; checklists do not.

When you click blank document in the start screen, the start screen closes and a new blank document appears on screen in the word app window?

Answers

yes it would but the start screen would still be open for windows 10

Who can effectively use website authoring software?

Answers

Final answer:

Website authoring software can be effectively used by individuals who want to create and design websites. Applications like Dreamweaver or FrontPage provide a visual interface, while hand-coding with HTML is another option for more experienced users.

Explanation:

Website authoring software can be effectively used by individuals who want to create and design websites. These tools provide a user-friendly interface that allows users to easily create webpages without extensive coding knowledge.

For example, applications like Dreamweaver or FrontPage provide a visual interface where users can drag and drop elements to design their websites. Hand-coding a webpage using HTML is another option for more experienced users who have a deeper understanding of web development.

If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she has on her computer

Answers

Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.

________ results when leisure time and available tools allow us to engage in creative acts.

Answers

Cognitive surplus results when leisure time and available tools allow us to engage in creative acts. It is a term that was introduced by Clay Shirky which pertains to the synthesis of the excess of people's energy, time and creativity leading to productivity sharing and creation.

The number of pixels displayed on the screen is known as ________.

Answers

Resolution of the screen. Ex. 1366x768

True or False: If your driver license or license plates are suspended for not obeying either financial responsibility laws, you will not be able to get a temporary license for any reason, not even for work purposes.

Answers

Statement Is True.

Further Explanation:

The Financial Responsibility Law requires owners and operators of motor vehicles to be  financially responsible for damages and/or injuries they may cause to others when a motor  vehicle crash happens. This law requires any person to have bodily injury liability insurance at  the time of the following:

A Citation for DUI, which results in a revocation. These cases require the following minimum  insurance coverage

$100,000 Bodily Injury Liability (BIL) (to one person). $300,000 Bodily Injury Liability to two or more persons. $50,000 Property Damage Liability (PDL)

If your driver license or license plates are suspended for not obeying either financial responsibility laws,  you will not be able to get a temporary license for any reason, not even for work purposes. It is TRUE.

Description:

According to the law it proves that you have the required insurance. If you don't, you may  receive a citation for not having proof of insurance. If your driver license or license plates are  suspended for not obeying either of these laws, you will not be able to get a temporary license  for any reason, not even for work purposes.  You could not violate the law :

“You must maintain insurance coverage throughout the vehicle registration period or you  must surrender the license plate(s) to any driver license or tax collector office”.

Learn more:  

The two motor vehicle insurance laws in Florida are the financial responsibility law and the what

        brainly.com/question/10742151

Keywords: Financial Responsibility Law, insurance, BIL, PDL

Final answer:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Explanation:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Suspension of driver's license or license plates is a serious consequence for not complying with financial responsibility laws. This means that you are unable to legally operate a vehicle until the suspension is lifted.

To regain your driving privileges, you will need to address the reason for the suspension, pay any applicable fines or fees, and provide proof of financial responsibility to the proper authorities.

In nutanix command-line interface (ncli) commands, each entity has a unique set of actions, but a common action across all entities is:

Answers

In nutanix command-line interface (ncli) commands, each entity has a unique set of actions, but a common action across all entities is LIST.

This is how the Command Format Nutanix Command-Line Interface look like:

ncli> entity action parameter1=value parameter2=value ...

entity can be replaced by cluster or disk, both are Nutanix entities. Other Nutanix entities can also replace entity.
 
action can be replaced by any valid action for the preceding entity.

An example of a command requesting for a list of all storage pools in the cluster looks like this:  
ncli> storagepool list

Some action requires parameters to limit its scope. Thus, parameters are found at the end of the command. 

Software that enables you to display and interact with text and other media on the web is a web ________.

Answers

It's a web site or web page

The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.

Answers

This sounds like open source. Open source is a concept that allows developers to edit the code and redistribute the code for what they need individually. Some examples of open source software are Chromium and Linux.

You have a new web app and the host for its is going to provide storage for your data on thier server. what is this called

Answers

Cloud storage

Hope this help:)

A computer connected to the internet that asks for data is a(n) ________.

Answers

The answer to this question is a Client. A client is a computer hardware or software that is connected to an internet to accessna service through a server. The client computer only communicates with the server which runs an operating system like Windows XP.

A ____ is an area in ram or on the hard drive designated to hold input and output on their way in or out of the computer system.

Answers

A buffer is a region in RAM or on the hard drive assigned to hold information and yield on their way in or out of the framework. In computer science , an information cushion or simply support is a zone of a physical memory stockpiling used to briefly store information while it is being progress starting with one place then onto the next. However, a buffer might be utilized while moving information between forms inside a PC.

What containsthe computers brain the central processing unit (cpu)?

Answers

Central Processing Unit. The CPU (Central Processing Unit) is the part of acomputer system that is commonly referred to as the "brains" of a computer. TheCPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program.

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. what does this device prevent

Answers

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. This device prevents the ignition of gasoline vapors in case the engine backfires. The backfire flame arrestor must be checked regular, be in good condition and be approved by the United States Coast Guard.

There are three required elements needed to connect to the internet: internet service provider, hardware, and __________.

cache
cross-platform capability
extranet
web browser

Answers

A web browser is needed to connect to the internet

The answer is definitely D: A web browser

To connect to the internet, you need the following things: A computer which comes with an operating system, Hardware (a modem or router supplied by the ISP), the ISP itself, and client software (the web browser). These things work together. Browsers get web pages and display them on your computer. It is the tool used to access the World Wide Web. The web browser itself is not the internet, it only helps you connect and view websites.  



What is the best source for a complete listing of navigation rules that apply to recreational boaters?

Answers

The best source for a complete listing of navigation rules that apply to recreational boaters is the United States Coast Guard. The US Coast Guard is an uniformed service, part of the United States Armed Forces .The responsibilities of the US Coast Guard besides Aids to Navigation (ATON), are: Search and Rescue (SRA)   Environmental Protection, Maritime Law Enforcement (MLE),  Ice Breaking, Port Security and Military Readiness.

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

Answers

This question, in it's raw form suggests that it is about information security -  in this case, password. There are several ways to make the password more challenging to hack. It's either make it encrypted or make/own a key-gen or key generator.

Key generator -  a key generator generates random characters which can be used as a password. It's effectivity lies on the number of characters used.

The answer for this question is none other than: Key-gen or key geneator.

What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1)); i++; if (i >= 3) { i = 5; } } while (i < 5);?

Answers

This prints aei

The loop progresses for i equal to 0, 1 and 2. But then i gets increased to 3, it gets set to 5, effectively terminating the loop. So only 3 characters get printed.
Other Questions
"list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment." Class sizes of various sections of college algebra at your university are an example of which type of data? quiizlet On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions. How would you describe jonathan edwards view of humanity? Which of the following is not considered one of the Andean countries? a. Uruguay b. Bolivia c. Chile d. Ecuador In this experiment, you will use a track and a toy car to explore the concept of movement. You will measure the time it takes the car to travel certain distances, and then complete some calculations. In the space below, write a scientific question that you will answer by doing this experiment. Which group of people depended on the bison for their way of life? Find the coordinates of the midpoint of the segment whose end points are H(6,4) and k(2,8) What type of severe weather would most likely decrease biodiversity by destroying sea turtle nest and hatchlings Hillary age is 3 years greater than 2/3 times Lilly's age if Hillary is 19 years old how old is Lilly All of the following are principles that help guide historians in their work EXCEPT which one? On the eastern front in 1942, which country was fighting off a German invasion and needed allied support? Poland The USSRFrance Austria A ball is thrown from ground level so as to just clear wall 4m height at distance 4m from wall and falls 14 m from wall . Velocity of ball ? Who has the power to hold the federal bureaucracy accountable for its actions and policies? A herd of 39 horses has 33 white horses some black horses. What is the ratio of black horses to white horses? Current flows in a light detection device when _____ collide with its pn junction. The function f(x) = x2 + 28x 192 models the hourly profit, in dollars, a shop makes for selling sodas, where x is the number of sodas sold and f(x) is the amount of profit. Part A: Determine the vertex. What does this calculation mean in the context of the problem? (5 points) Part B: Determine the x-intercepts. What do these values mean in the context of the problem? (5 points) Renee is aware of where her son is whenever he goes out, and she requires him to call if there is any change in plans. this is an example of _____. Find two positive fractions with a quotient of 5/6 There are two aircraft carriers, A and B, and the carrier A is longer in length the carrier B. The total length of these two carriers is 4178 feet, while the difference of their lengths is only 14 feet. Steam Workshop Downloader