answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
2 years ago
15

What is a ribbon in word

Computers and Technology
2 answers:
nika2105 [10]2 years ago
7 0
A ribbon is somehing ou earn
nika2105 [10]2 years ago
3 0
It is a set of toolbars on different tabs!
You might be interested in
Which of the following is not true of how computers represent complex information
mote1985 [20]

Answer: c. Depending on context the same sequence of bits may represent different types of information.

Explanation:

The options for the question are:

A. Computing devices use patterns of bits to represent complex information

B. Abstraction helps represent complex information by surfacing complexity that might otherwise be hidden

C. Depending on context the same sequence of bits may represent different types of information

D. Common abstractions that are represented by computing devices include numbers, characters, and color.

The following are true of how computers represent complex information:

• Computing devices use patterns of bits to represent complex information

• helps represent complex information by surfacing complexity that might otherwise be hidden

• Common abstractions that are represented by computing devices include numbers, characters, and color.

Therefore, the option that is not true of how computers represent complex information is that "depending on context the same sequence of bits may represent different types of information".

5 0
2 years ago
Read 2 more answers
Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY
const2013 [10]

Answer:

D.

Explanation:

Most students would fail to realize that the pictures they use also need citations so that would be the MOST LIKELY to lead to legal consequence.

7 0
2 years ago
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
wariber [46]

Answer:

c. honeypot

Explanation:

A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.

4 0
2 years ago
A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
REY [17]

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

6 0
2 years ago
One form of competition-based pricing is going-rate pricing, inwhich a firm bases its price largely on competitors' prices, with
Kobotan [32]

Answer:

Out of the four options , the option that is most suitable  is

option b. Cost, demand

<u>cost</u> or to <u>demand</u>

Explanation:

Going rate pricing is a form of competition based pricing. This pricing is commonly used for homogeneous products i.e., products with very minute distinction or variation among producers.

This type of pricing is based on setting price on the basis of the prevailing market trends in pricing of goods or services, so, the prices are largely based on the competition in the market rather than considering its own cost and demand.

8 0
2 years ago
Other questions:
  • Wesley has to create a web banner to announce a “Back to School” sale by an online retailer. Which information should he determi
    15·2 answers
  • Which data type stores images and audio visual clips?
    15·1 answer
  • In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
    8·1 answer
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • Program MATH_SCORES: Your math instructor gives three tests worth 50 points each. You can drop one of the test scores. The final
    7·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • You know that you should check the room for security against unwanted entry do you check locks on doors and windows. What else d
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!