Amanda, an Eighth grader, is learning to use Microsoft Office 2016 applications. She does not know the different ways to copy objects from a document. Amanda should use the _____ to find information about copying objects.?
A. ?Get Information button
B. ?Quick Access Toolbar
C. ?References and Footnotes tab
D. ?Tell me what you want to do box
Answer: D
You might also like to view...
In the following example, how many times is the module called?
``` Module main () Call Welcome (5) End Module Module Welcome (Integer number) If number > 0 Then Display “Welcome to our store.” Call Welcome (number – 1) End If End Module ``` a. 1 b. 5 c. 6 d. 8
Describe how rule-based access controls can be implemented in the DAC model.
What will be an ideal response?
Enforcing referential integrity assures that ________
A) you cannot leave that field empty B) you cannot enter a value in the foreign key if there is no corresponding value in the primary key C) you cannot enter the same value in the foreign key of the same table D) you cannot enter invalid or incorrect information
______ is a secure version of HTTP that encrypts data sent to and from a web server
a. HTTPS b. SFTP c. L2TP d. SSH