Match the following features or parts of Office 2013 to their descriptions:

I. contextual tab
II. Mini toolbar
III. title bar
IV. gallery
V. status bar

A. easy access to formatting commands
B. contains groups of commands related to a specific, selected object
C. set of selections when you click a More button
D. contains information relative to the open file
E. includes file name and application


B, A, E, C, D

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

C++14's global rbegin, rend, crbegin and crend functions are for iterating through a built-in array or a container from back to front. b. Functions rbegin and rend return iterators that can be used to modify data, and rcbegin and rcend return const iterators that cannot be used to modify data. c. Functions begin and end and their C++14 const and reverse versions may also receive container objects as arguments—each function calls the corresponding member function in its container argument. d. When iterating using iterators, it’s common for the loop-continuation condition to test whether the iterator has reached the end of the built-in array or the container. This technique is used by many Standard Library algorithms.

Computer Science & Information Technology

When should you enter sensitive information in a pop-up?

a. when it is a site you use regularly b. when using an online banking site c. only when it is absolutely necessary d. ideally, never

Computer Science & Information Technology

Two-dimensional arrays are often used to represent ________ .

a) a pie chart b) distances c) lines d) tables

Computer Science & Information Technology

Critical Thinking Questions Case 3-1 ? Your friend Marvin works weekends in an electronics store selling computers. You are in the market for a new desktop for your home.  Why does Marvin recommend that you consider an all-in-one?

A. It may be less expensive than purchasing a tower and monitor separately. B. They usually come with a better warranty. C. Although they take up more space, they are more powerful. D. They typically are less susceptible to hacking and malware.

Computer Science & Information Technology