In the accompanying figure, the ____ displays below the Application bar, and contains buttons and boxes that allow you to perform tasks more quickly than using the Application bar and related menus.
a. document bar
b. options bar
c. Application bar
d. status bar
b. options bar
You might also like to view...
The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of _______, no matter how broad or narrow, is known as system acquisition.
Fill in the blank(s) with the appropriate word(s).
Which site has easy-to-read overviews of a lot of technical information?
A) Washington Post Learning Network B) Beginner's Guide to Life and the Internet C) Wikipedia D) Webopedia
An RTF file can easily be converted to a Word file format
Indicate whether the statement is true or false
________ bypass is a procedure in which you can enable all communications from approved computers to bypass the firewall when communicating with the server using IPsec-secured messages
a. Authenticated b. Approved c. Advanced d. Encapsulated