Match each of the following actions to its tab

I. Show the rulers
II. Add text effects
III. Arrange or wrap text around an object
IV. Draw a text box
V. Add a page border

A. Design tab
B. Insert tab
C. View tab
D. Home tab
E. Format tab


C, D, E, B, A

Computer Science & Information Technology

You might also like to view...

It is possible to restrict access to data depending on the database user's privileges.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the following operators with their description

I. < = II. > = III. < IV. > V. < > A. Greater than or equal to B. Less than or equal to C. Less than D. Not equal to E. Greater than

Computer Science & Information Technology

Which of the following is used to determine whether or not a user's account is authorized to access a server remotely?

A. VPN B. RDP C. LDAP D. Encryption

Computer Science & Information Technology

How does a Trojan horse get past security mechanisms to harm a victim?

A. By attaching itself to an existing file B. By displaying advertisements for intriguing applications C. By seeming to be a benign item D. By using system resources to distribute itself to other networked devices

Computer Science & Information Technology