Amanda, an Eighth grader, is learning to use Microsoft Office 2016 applications. She does not know the different ways to copy objects from a document. Amanda should use the _____ to find information about copying objects.?

A. ?Get Information button
B. ?Quick Access Toolbar
C. ?References and Footnotes tab
D. ?Tell me what you want to do box


Answer: D

Computer Science & Information Technology

You might also like to view...

In the following example, how many times is the module called?

``` Module main () Call Welcome (5) End Module Module Welcome (Integer number) If number > 0 Then Display “Welcome to our store.” Call Welcome (number – 1) End If End Module ``` a. 1 b. 5 c. 6 d. 8

Computer Science & Information Technology

Describe how rule-based access controls can be implemented in the DAC model.

What will be an ideal response?

Computer Science & Information Technology

Enforcing referential integrity assures that ________

A) you cannot leave that field empty B) you cannot enter a value in the foreign key if there is no corresponding value in the primary key C) you cannot enter the same value in the foreign key of the same table D) you cannot enter invalid or incorrect information

Computer Science & Information Technology

______ is a secure version of HTTP that encrypts data sent to and from a web server

a. HTTPS b. SFTP c. L2TP d. SSH

Computer Science & Information Technology