Match each of the following actions to its tab
I. Show the rulers
II. Add text effects
III. Arrange or wrap text around an object
IV. Draw a text box
V. Add a page border
A. Design tab
B. Insert tab
C. View tab
D. Home tab
E. Format tab
C, D, E, B, A
You might also like to view...
It is possible to restrict access to data depending on the database user's privileges.
Answer the following statement true (T) or false (F)
Match the following operators with their description
I. < = II. > = III. < IV. > V. < > A. Greater than or equal to B. Less than or equal to C. Less than D. Not equal to E. Greater than
Which of the following is used to determine whether or not a user's account is authorized to access a server remotely?
A. VPN B. RDP C. LDAP D. Encryption
How does a Trojan horse get past security mechanisms to harm a victim?
A. By attaching itself to an existing file B. By displaying advertisements for intriguing applications C. By seeming to be a benign item D. By using system resources to distribute itself to other networked devices