Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations

Answers

Answer 1

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.


Related Questions

A radio and communications security repairer is responsible for both radio and satellite communication systems.

True
False

Answers

i'm almost certain the answer is true

Answer:

The answer is true

Explanation:

I got it correct on the quiz

Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up

Answers

Answer:

B

Explanation:

from 3dg3

Answer:

D.click on the display window and drag it up

Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso

Answers

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

9.5 Code Practice edhesive

Answers

Answer:

a = [[34,38,50,44,39],

    [42,36,40,43,44],

    [24,31,46,40,45],

    [43,47,35,31,26],

    [37,28,20,36,50]]

   

sum=0

for r in range(len(a)):

   for c in range(len(a[r])):

       sum = sum + a[r][c]

       

       

print("Sum of all values: " + str(sum) + "\n\n")

print("Average of all values: " + str(sum / (len(a) * len(a))))

Explanation:

I got 100%.

Answer:

a = [[34,38,50,44,39],

   [42,36,40,43,44],

   [24,31,46,40,45],

   [43,47,35,31,26],

   [37,28,20,36,50]]

   

sum=0

for r in range(len(a)):

  for c in range(len(a[r])):

      sum = sum + a[r][c]

       

       

print("Sum of all values: " + str(sum) + "\n\n")

print("Average of all values: " + str(sum / (len(a) * len(a))))

Explanation:

Sum of all values: 949

Average of all values: 37.96

What is the difference between electrical and electronic devices?

Answers

Answer:

A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.

Answer:

the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.

Explanation:

i hope it helps ;)

Suppose cell C5 contains the formula =B$6+C1.


Match each formula with its respective cell if you copied it.


=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1


Thank you, have a great week.

Answers

Answer:

=A$6+B4 will be in B8

=B$6+C6 will be in C10

=C$6+D2 will be in D6

=D$6+E1 will be in E5

Explanation:

$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.

As formulars are copied, the references change respectively.

With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.

As we move left and right, the column alphabet will also experience change like the rows did.

Only the absolute reference won't change no matter the direction.

Hence,

=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8

=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10

=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6

=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5

What is an "Expert System"?

If you can’t answer pls leave It

Answers

Answer:

program that use artifical intelligents

Explanation:

Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.

Complete the sentence with the correct response.

If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.

Answers

Answer:

You would use the Android operating system.

Explanation:

Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.

What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.

Answers

Answer:

The characteristics of calendar sharing options in Outlook 2016 are;

1) The most common thing to share in Outlook is the calendar

2)  The Publish Online option is for users outside an organization

4) Publishing a calendar online will allow anyone in the world to see it

5) The Share option opens an email message that sends the calendar link

6) Calendar sharing options include Email, Share, Publish Online, Delegate

Explanation:

1) Sharing is used mostly by a group of people working on a given project

Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)

Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar

2) The Publish Online option allows a user to make a calendar available to people outside the organization

3) The calendar sharing permissions are;

a) Who can view the date and time marked as busy

b) Who can view the location and titles of appointments

c) Who can view all the calendar details

d) Who can edit

e) Who can delegate

Therefore, changes in calendar permissions does not only change what the user can see

4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization

A published calendar can be viewed by everyone that has the calendar link

Therefore, publishing a calendar online will allow anyone in the world to see it

5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button

Therefore, the Share option opens an email message that sends the calendar link

6) Calendar sharing options includes

a) Sharing the calendar within the organization

b) Publishing a calendar to the web to share the calendar

c) A calendar can be shared in an email

d) Authority can be delegated to a particular calendar

Therefore, calendar sharing options include Email, Share, Publish Online, Delegate

1, 2, 3, 5

just did it

What is the danger of open-source software when it comes to military robotics?

Answers

Answer:

The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.

Explanation:

Open source software is available to the general public.

Feel free to copy and paste this or put it into your own wording. Have a nice day!

Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.

soak testing.
stress testing
load testing
spike testing

Answers

Answer:

load testing

Explanation:

to see if the activity can handle under performance

David plays racing games on his way to work. He uses the analog stick to navigate his vehicle through other artificial intelligence-controlled
opponents. On what platform is he playing the game?
A.console
В.personal computer
C.mobile
D.handheld

Answers

Answer: David is most likely playing on Handheld.

Explanation: You can infer that he is playing on a handheld due to the fact that he is playing this game on his way to work, and the fact that he is controlling the game using an analog stick. Because of this, you can assume that what he is playing on needs to be portable, making it likely he is using a handheld.

Answer:

d - handheld

Explanation:

PLATO

Who is Carl Thompson?

Answers

Carl Thompson was a well know Jazz player back in the mid 1900s

ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT

Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?

List three ICT tools that are commonly used in the education system?


Identify two ways in which ICT has impacted the education sector?

Answers

Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)

Explanation:

Hardware refers to programs and protocols used on a computer system.

True
False

Answers

Answer:

False

Explanation:

Answer:

false

Explanation:

i JUST took the quiz

write any two reasons why files are stored in folders​

Answers

Answer:

Explanation:

The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.

Answer:

Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.

I hope this was helpful! =)

A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *

Answers

so the word your looking for is Properties so it would be

A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *

scav

top secret mission lolz

Answers

Answer:

whats the mission about??

Explanation:

~evita

What is Polymorphism in programming? Explain in your own words with examples.

Answers

Answer:

A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.

Explanation:

Answer:

Polymorphism is a feature of object-oriented

programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

Explanation:

hope it helps

Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. Which information system will he use in the unit to keep track of the deliveries?

Answers

Answer:

E. Transaction processing system

Explanation:

Explanation: He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order. Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.

High-level programming languages are (5 points)
O a
closer to human languages
Ob
less time consuming to run
ос
much more in control over the hardware
Od
similar to native machine code

Answers

The answer is A. Closer to human languages

Use the drop-down menus to match each description with the part of a report where it is located.

named moons in the solar system:
page number printed at the bottom of page 1:

page number printed at the bottom of page 20:

group of data titled “Hawks” in a report on species of migrating birds:

report titled “Technology in the Workplace”:

calculation printed beneath a group of data:

date of a report printed at the top of pages 2–100:

Answers

Answer:

1) Detail

2) Report footer

3) Page footer

4) Group Header

5) Report header

6) Group footer

7) Page header

Explanation:

I just did the assignment

You read an article about someone who leaves USB sticks in college libraries so that people will pick them up, insert them into their laptops, and download malware. This is an example of:

phishing.

eavesdropping.

wiretapping.

social engineering.

Answers

Answer:

social engineering

Explanation:

 

The above scenario of USB use is an example of social engineering.

What is Social Engineering?

This is known to be when a person gets phishing email via any method known as social engineering.

Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.

Learn more about social engineering from

https://brainly.com/question/26072214

test unit 8 edhesive answers ​

Answers

What are the questions

You are taking a college class. The textbook costs over $150, but you find a PDF of it online for free. If you download the PDF, you are almost certainly guilty of:

breach of contract.

patent violations.

copyright infringement.

data integrity violations.

Answers

Answer:

Copyright infringement.

Answer:

copyright infringement

Explanation:

A computer is set up to copy DVDs overnight and have them ready the next morning when employees come into work. This would be an example of _____.

buffering
link-loading
multitasking
batch processing

Answers

Answer:

batch procressing

Explanation:

This is when something is scheduled to be done.

In this example, the computer is scheduled to copy DVD's and have them ready the next morning.

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *

Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.

Software used for professional print publications such as posters, books, and email newsletters is called a: *

Professional software
Word processing software
Desktop program
Desktop publishing software

Which of the following criteria does NOT determine the credibility of a source? *

How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author

The process of finding a solution to a difficult or complex issue to make it easier is known as *

problem
problem-solving
input

A series of actions taken in order to solve a particular problem is known as the____________ *

process
problem
input
output

A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *

problem
output
algorithm
input

Which is the third step in the problem-solving process? *

Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem

A list of sources you used when writing a scholarly article on a specific subject is known as a: *

intellectual-property
credibility
bibliography
trademark

Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter

Which of the following is NOT a writing style format for academic purposes? *

Times New Roman
American Psychological Association
Modern Language Association

The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *

plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *

SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.

say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.

Answers

Answer: 1 Definition of the problem

        2 Desktop publishing software

        3 The gender of the author

4 problem-solving

5 input

6 algorithm

7 Select the most effective solution

8 credibility

9 All of the above

10 American Psychological Association

11 copyright

12 agree that there are fewer emerging jobs

sell goods and services as we’ve never been able to

Explanation:

Which of the following is a programming language that translates code one line at a time? (5 points)
a
C:
b
Java
с
Machine
d
Python

Answers

Answer:

Python!

Its the only programming language that is an interpreted language

Hope it helped <3

Which language paradigm interacts well with database systems in business environments that use SQL?

A) logic-based
B) fourth-generation
C) data-oriented
D) aspect-oriented

Answers

The answer is C, can you mark me brain
Other Questions
Drag the expressions into the order in which the expressions are listed from greatest value to least value. Place the expression with the greatest value at the top and the one with the least value at the bottom.(528010)(31410)528031410.6 (5280 314)(5280314)111 What happened on October 4. 1957?A The Soviet Union launched a missile at the United StatesB The United States launched a missile at the Soviet UnionC The Soviet Linion launched the first artificial satellite SputnikD The United States launched the first artificial satellite, SputnikWhat was so scary about SputnikA Non man-made technology had ever been launched into space C Nobody knew where it would land if it fell back to EarthB The same technology that launched Sputnik could be used to launch a nuclear warhead at any city on the planetD There was nothing scary about SputnikWho was the president of the United States during the Sputnik launchA Dwight . EisenhowerB Franklin D. RooseveltC John F. KennedyD Barack ll. Obama QUESTION 2The equation for this problem is what? The business has 23 employees that work 8 hours per day at $10.62 per hour. then find a roost that's snug and tightto brave the long and frozen night.The imagery in lines 3 and 4 of the poem creates a sense of -lonelinessacceptanceBaffectionDsecurity PLS HELP I WILL MARK BRAINLIEST!!You want to take some of your friends to see a movie Movie tickets cost $9 at the local theatre. You will purchase a bucket of popcorn for $7.50. How many friends can you take if you spend at most $79.50. Write the inequality and solve it. What does genre mean? an article bought a television for 2500 dollars and sold for 2325dollars find a.loss b.loss% The neighbor "lady" chose Harriet because she came cheap. True False MATH TEST AND I GIVE BRANLISTE Please answer the question below! Brainliest will be given :) or provide me with a picture of the answers. Thanks! can someone please help me with this question? is RbCl soluble or insoluble in water Which of the two previously described wing designs should result in a longer flying time? 1.In this environment, which trait is adaptive for the birds2. Did the birds choose to have the adaptive trait? (yes or no)3.Sherman suggests that reproduction always creates individuals with adaptive traits. Does this seem correct? Why or why not? PLEASE HELP!! Why do you think Americans feel that the Gettysburg Address still speaks to them today? 30 mm40 mmWhat is the length of the hypotenuse? What does a democracy do that is different from an oligarchy? and What does a monarchy do that is different from democracy? Order the numbers from least to greatest.23% , 1/4 , 0.225 . give a reason why it is not advisable to heat magnesium before heating ammonium nitrate please I need help! will give brainlist1. What types of geological events or changes occur at divergent plate boundaries?2. What types of geological events or changes occur at convergent plate boundaries?3. What types of geological events or changes occur at transform plate boundaries?