Microsoft Word® and Microsoft Publisher applications have similar tabs; however, Microsoft Publisher does not have the _____ tab. Insert Page Design Page Layout Home

Answers

Answer 1

Answer:  Page Layout

Explanation:

- To add a page in publisher, right click on the page and select insert page whereas in Microsoft word, go to the Insert tab and from there select insert page

- To select the page or the certain paragraph that you want to change the layout for. Then click on the page layout tab, and from there you can choose different options (e.g. portrait, landscape) to adjust the orientation for your document

- The home tab, is available in both Microsoft word and publisher

- Page Design is available in both

Answer 2

Answer:

page layout

Explanation:


Related Questions

What are two ways to accept data typed into a cell? pressing the Backspace key or clicking the scroll arrows pressing the Tab key or pressing the Backspace key clicking the scroll arrows or pressing the Enter key pressing the Tab key or pressing the Enter key

Answers

If the data is text, simply press enter after typing data into cell.

If the data typed is numeric, but need to be considered text, add ( ' ) on the leftmost or start of the entry.

If the data typed is a formula, add equal to leftmost or at the start of the entry.


Answer:Press the Tab key.

Explanation: right on edge22

What are 3 things that a photojournalist do in a day's work?

Answers

Hi there!

A photojournalist is a person who takes photos, edits them, and displays them publicly. They can be hired by certain companies such as stores, for catalogs. The whole point (though), is for them, with their pictures, to tell a visual story.

I hope this helps you!

~DL 

The ____ aggregate function finds the largest value

Answers

The MAX aggregate function.

MAX aggregate function returns the maximum value of an expression over a group of rows. It can be used as an analytic or an aggregate function. Aggregate function MAX can operate with Boolean values or can be converted to a Boolean.



A data ________ is the structure and organization of data which involves fields records and files

Answers

Data hierarchy is the structure and organization of data which involve files and field records.

TRUE/FALSE: In order to use an object in a program, its class must be defined.

Answers

Yes that is correct. True

What is the program that searches through data bases?

Answers

if i'm right its call: Algorithm

What technique can improve web search results? Add articles, prepositions, and pronouns Be general rather than specific Focus on keywords Use periods, commas, and semicolons

Answers

I'd say focus on keywords

You can greatly accomplish the task of improving web search results through search engine optimization (SEO). In order to do this, you can use keywords strategically. Keywords you choose to use should be as specific to your products as possible. Keywords lays a foundation for your SEO.

Answer:

focus on key words

Explanation:

You want to be able to access your home computer using remote desktop while traveling. you enable remote desktop, but you find that you cannot access your computer outside of your home network. what should you do?

Answers

Get a program for this perpose or perhaps get a new computer
hey 

get a app that well let u do it

In dhcp, what address is reserved for use by clients that are not yet configured with an ip address?

Answers

The answer is : 0.0.0.0   In DHCP, 0.0.0.0 is reserved for use by clients that are not yet configured with an IP address.  The IP address 0.0.0.0 indicates different uses at different places. Usually, it’s a non-routable meta address that’s not bound to any particular remote address. Dealing with servers, it means all IPv4 addresses in the local machine.

Which chart tools ribbon tab enables a user to apply a style to the selected chart?

Answers

Design is the chart tools ribbon tab that enable the user to apply a style to the chart selected.

What functionality can a vulnerability scanner provide that a port scanner cannot?

Answers

Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
port scanner allows testing of open ports and firewalls. It discovers open UDP ports on your target system by scanning with NMAP and by doing so it is the first step of a complete vulnerability assessment. 

Vulnerability scanners offer broader functionality than port scanners by identifying and testing for specific vulnerabilities and providing remediation recommendations, whereas port scanners only identify open or closed ports.

Both vulnerability scanners and port scanners are critical tools used in cybersecurity, but they serve different purposes.

Port Scanner

A port scanner, like NMAP, is used to identify open ports on a network. This helps in understanding the services and applications running on different systems within the network. However, its functionality is limited to scanning and reporting on open or closed ports, without providing in-depth insight into the potential vulnerabilities of the system.

Vulnerability Scanner

In contrast, a vulnerability scanner, such as Nessus or OpenVAS, goes a step further by not only identifying open ports but also actively testing the system for potential vulnerabilities. These scanners check for misconfigurations, missing patches, and security flaws that could be exploited by attackers.For example, while a port scanner may report that port 80 is open, a vulnerability scanner would analyze the web application running on that port to ensure it is not susceptible to known threats like SQL injection or cross-site scripting (XSS). Additionally, vulnerability scanners often provide detailed reports and recommendations for remediation, which port scanners do not.

A _______ is a list of instructions for the computer to follow to accomplish the task of processing data into information. systems design word processor program systems analysis

Answers

A program is a list of instructions for the computer to follow to accomplish the task of processing data into information. This specific set of ordered operations performs a specific task when executed by a computer.
Each program is written with some programming language, which  uses symbols, words, and phrases to instruct a computer to perform specific operations.

You find that your mobile device won't load any apps. identify the choice that is not a likely cause.

Answers

You may have used all your data for the month. is the answer
you have used up all your data of the month 

You already created a line chart, but now decide that you want to change this chart to a pie chart. to do this, you click ____ from the type group in the chart tools design tab. change chart type alter existing chart modify chart new chart

Answers

Click change Chart Type from the type group in the chart tool design tab.

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.

Answers

The answer is server.

If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated.

Answers

The answer is IP address.  If you experience a denial-of-service attack, you can use firewall logs to determine the IP address from which the attack originated.

Answer: IP Address

Explanation:

Denial of service (DOS) attack is basically occur when the multiple system and the web servers are flooded with the bandwidth and the system resources. If the system are flooded with the traffic then it cause the denial of service attack. Botnet is one of the example of DOS.

When we experiencing the DOS attack then, we used the firewall logs for determine the origin of attack by using the IP address. IP address is the internet protocol that uses for the communication purpose.The IP address is in the form of numerical label that assigned to the every network devices  for the communication. The main function of the IP address is that it is used for the location addressing.

 

The ipv6 address, 2001:0000:0000:3210:0800:200c:00cf:1234, can be shortened to __________.

Answers

The answer is : 2001::3210:800:200C:CF:1234   You can drop leading zeroes. 00CF becomes CF and You can remove one or more "hextets" of zeroes and replace with double colons (::).

ohn would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he really likes, but he can only afford about 60% of the monthly rent. What is the best housing option for John?

Answers

Ohn should find a roommate to split the rent.

"which key do you hold down to select a group of contiguous files"

Answers

The "Ctrl" key is the answer.

The eiffel tower was made using this type of construction

Answers

The Eiffel Tower was created using Iron and a Latticework Construction. The Eiffel tower  is a wrought iron lattice tower on the Champ de Mars in Paris, France. It is named after the engineer Gustave Eiffel, whose company designed and built the tower.  The latticework construction supports its own weight. The strips of metal are crisscrossed as the tower is built, supporting itself as it goes up. 

WILL GIVE BRAINLIST IF ANSWERED RIGHT 1. An engine's _______ contains the cylinder block, the cylinders, the piston, the connecting rods, and the crankshaft assemblies. A. upper end B. lower end C. back end D. bottom end Student Answer: A Answer: Incorrect Reference: Section 2.1 2. Compression gases that get past the rings and into the engine crankcase are called A. compression gases. B. blow-by gases. C. gas leaks. D. intake gases. Student Answer: C Answer: Incorrect Reference: Section 2.2 5. Technician A says that the burning of the air-and-fuel mixture in the cylinder is called fuel activation. Technician B says that the basic function of the upper-end components is to control the flow of air-and-fuel mixture into the engine and the flow of exhaust gases out of the engine after combustion. Who is right? A. Both Technicians A and B B. Neither Technician A nor B C. Technician A only D. Technician B only Student Answer: A Answer: Incorrect Reference: Section 2.1 11. What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring Student Answer: B Answer: Incorrect Reference: Section 2.2 17. What does the above figure represent? A. Cam-ground piston B. Piston offset C. Stroke D. Bore Student Answer: B Answer: Incorrect Reference: Section 2.2 19. Technician A says that the piston's most important function is to transfer the force produced by the burning air-and-fuel mixture into usable power. Technician B says that the piston size is used to help form a seal between the piston and the cylinder walls. Who is right? A. Both Technicians A and B B. Technician B only C. Technician A only D. Neither Technician A nor B Student Answer: A Answer: Incorrect Reference: Section 2.2 20. Which of these is the distance from the head of the piston (not including any dishes or domes) to the deck surface of the engine block? A. Piston Deck Clearance B. Rod Length C. Piston Compression Height D. Compression Ratio Student Answer: C Answer: Incorrect Reference: Section 2.2

Answers

first three are c b and d

What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring

The correct answer D. Oil control ring

The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interleave format.

Answers

The answer is mpeg-4.  The most commonly used video formats are the mpeg-4 format, the windows media audio/video format, and the audio visual interleave format.

The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:

Answers

The answer is Cybercrime.  The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  Common types of cybercrime involve hacking, online scams and fraud, identity theft, etc.

You have users who need to do some programming projects in the ruby programming language

Answers

The answer is dnf list ruby.  You have users who need to do some programming projects in the ruby programming language.  The DNF command used to find out if there is a ruby package available to install on the Linux server is dnf list ruby.  

if nothings faster than light then how do the dark get there first????

Answers

Darkness only happens because of the lack of light. For instance, when it's nighttime the only reason it's dark is because there is not enough light to create, well, light.

A(n) _________ uses the same software and service structure as the internet, but it contains only the company's private information such as documents managed by microsoft sharepoint.

Answers

An intarnet uses the same software and service structure as the internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.
The term intranet denotes is a private internet that is used exclusively within an organization and it is accessible only to an organization's staff. 

Why might the government censor what its citizens see on the internet?

Answers

to protect easy hacking installments that could damage how the government is working
It might either spread false, dangerous,or terrorist info or to keep the public from knowing and either spreading sensitive info or too keep people calm.

also they might be lizard people

The program used to create the file where you want to insert the object is called the ____.

Answers

It is called the OLE

An example of software most commonly associated with productivity software is ____.

Answers

Hello User

Answer: An example of software most commonly associated with productivity software is word processing software

Word processing software is a program used to manipulate a text document. 

Hope This Helps
-Chris

________ is a software that interprets java bytecode.

Answers

Hello User


Answer: Java virtual machine is a software that interprets java bytecode.

I hope this helps you
-Chris
Other Questions
How is a line of credit similar to a credit card? A. Interest is charged only on the amount you actually borrow. B. The interest rates are the same. C. They both require co-signers. D. Lenders don't check your credit score. Please select the best answer from the choices provided A B C D Lorraine is the marketing manager at sibil furnishings. to promote the latest range of furniture, she decides to place ads in local newspapers, on the radio, and on television. she also decides to aggressively advertise the products through interior design bloggers. in the context of advertising, lorraine is involved in _____. how many ounces of 30% hydrochloric acid solution and 80% hydrochloric acid solution must be mixed to get 10 oz of 50% hydrochloric acid solution What is the surface area of a cylinder with a radius of 5 ft and a height of 2 ft? A flagpole stands on a concrete region, as shown. What is the approximate perimeter of the concrete region? Use 3.14 for . Thanks! The battle of gettysburg marked the turning point against the confederacy during the civil war. question 66 options: a. True b. False Twenty five percent of all telephones of a certain type g Crown fires tend to be more beneficial in Ponderosa pine forests because they stay close to the ground, burn relatively cool, and clean up forest debris to give the trees a quick burst of nutrients? Lupe has 14 stickers that she wants to give to 2 friends. She wants each friend to have the same number of stickers. Select the three statements that describe how Lupe should give the stickers to her friends. Each friend gets 142 stickers. Each friend gets 2 of the 14 stickers. Each friend gets 142 stickers. Each friend gets 7 of the 14 stickers. What is the simplified form of the following expression? 10abc^2 sqrt 49a^2b^2c^2 Cherry cells have 32 chromosomes. how many chromosomes do each of the daughter cells produced by mitosis have? Which of these is the best description of a typical organism in the plant kingdom? Selena overhears a classmate from her educational psychology class state that piaget's theory of cognitive development implies a teacher-centered approach to instruction rather than a student-centered approach since cognitive development is more effectively stimulated and guided by those who are more knowledgeable and skilled. selena is fairly certain that this reflects vygotsky's theory but decides to first check psychology applied to teaching. selena's behavior best reflects the effect of A bookstore costs $90 a day to keep open, and spends $12 for each book it sells. the store charges $18 for each book it sells. If n represents the number of books sold, which equation represents the revenue function for this bookstore? 13) The pancreas secretes ____________ enzymes into the small intestine.14) Chronic pancreatitis does not resolve itself and results in a slow destruction of the pancreas. True or FalseTrueFalse15) Acute pancreatitis is more common in women. True or FalseTrueFalse16) In cirrhosis of the liver, ________ tissue replaces normal, healthy tissue.17) Scar tissue on the liver blocks what?A) digestive juicesB) glucoseC) blood flowD) white blood cells18) Which is not a symptom of cirrhosis?A) loss of memoryB) abdominal painC) fatigueD) loss of appetite19) Alcoholic neuropathy is a disorder involving increased nerve functioning caused by damage that results from excessive drinking of alcohol. True or FalseTrueFalse20) The most common symptoms of alcoholic neuropathy are numbness, tingling, burning feet, or ___________.21) Cardiomyopathy causes the heart muscle to beA) weakenedB) shrunkC) discoloredD) inflamed22) High blood pressure means high pressure in theA) veinsB) arteriesC) capillariesD) heart23) The use of alcohol causes a chemical in the kidneys to be produced that attacks testosterone. True or FalseTrueFalse24) FAS develops inA) pregnant womenB) newborn babiesC) infantsD) unborn babies If you squeeze one orange you would get 4 ounces of juice do you want does make 32 ounces of juice how many oranges much you squeeze The belief that population growth tends to outstrip expansion of food production, leading to natural curbs on the population such as famine and war, is called: What is the mode of these numbers? A 40. B 43. C 26 and 31. D. 31 and 43 HELP FAST!!!!!!!Give a few examples of how biotechnology has affected the following fields:Medicine: Agriculture: Conservation: Whoisthe first person to arrive at juliet's tomb in scene 3/ why is he there?