The files you create in Microsoft Word 2016 are called _________.?
A. presentations
B. documents
C. databases
D. workbooks

Fill in the blank(s) with the appropriate word(s).


documents

Rationale: The files you create in Microsoft Word are called documents. The files you create in Excel are called workbooks (commonly referred to as spreadsheets). Access files are databases, and PowerPoint files are presentations. See 9-1: Exploring Common Elements of Office Application Windows

Computer Science & Information Technology

You might also like to view...

State which of the following are true and which are false. If false, explain why.

1)Member function read cannot be used to read data from the input object cin. 2) You must create the cin, cout, cerr and clog objects explicitly. 3) A program must call function close explicitly to close a file associated with an if stream, ofstream or fstream object. 4) If the file-position pointer points to a location in a sequential file other than the beginning of the file, the file must be closed and reopened to read from the beginning of the file. 5) The ostream member function write can write to standard-output stream cout.

Computer Science & Information Technology

____ is a versatile and popular file format for photographs and gradients.

A. GIF B. JPEG C. PNG D. BMP

Computer Science & Information Technology

You are the security administrator for your company. Your company's network contains over 20,000 desktop computers and 1,000 servers that all run some version of Windows. You have received numerous alerts from the internal IDS of a possible malware infection spreading through the network via the Windows file sharing services. This is an emergency situation that could lead to widespread data

compromise. A security analyst believes that the best course of action is to block the file sharing service across the organization by placing ACLs on the internal routers. Which of the following should you do before applying the ACLs? A. Call an emergency change management meeting to ensure the ACLs will not impact core business functions. B. Apply changes to the ACLs immediately. C. Meet with the entire security team to obtain approval on the solution. D. Implement the solution immediately if it is considered a best practice.

Computer Science & Information Technology

Like an IP address, the components of a domain name are separated by commas.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology