What are the steps to creating a text box? Use the drop-down menus to complete them.

1. Go to the
View
tab on the ribbon.

2. Click
.

3. Select any of the templates shown or
, which will open a blank text box.

4. Position the text box and adjust the text size, font, and color as desired.

Answers

Answer 1

Answer: The answers (in order) are

Insert

Text Box

Draw Text Box

Explanation: Just took the test on edgen, November 2021.


Related Questions

In this paper https://arxiv.org/pdf/2008.10150.pdf, I'm having a hard time understanding how the assignment in the picture is derived, can you please work this out?

Answers

Answer:

f*(i,z) = log pxz

Explanation:

they round

Yea I’m going home with you and I’m not going to sleep sleep early

Write SQL queries to answer the following questions: (15 points) a. Which students have an ID number that is less than 50000

Answers

Answer:

SELECT * FROM STUDENTS WHERE ID < 50000

Explanation:

If we assume the table is called STUDENTS, then we want to select everything (represented by *), where (like an if statement) the ID (assuming the name of the column) is less than 50000.

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection

Answers

There are several ways of connecting to the internet aside the use of WiFi Hotspot. Hence, Keisha could make use of Bluetooth or a modem.

Bluetooth tethering allows users to establish internet connection between smart devices such as a smartphone and a computer by using the Bluetooth functionality of the devices.

Similarly, modems can be used to establish a connection by inserting a data Sim into the USB modem and Inputting it into the port of the computer.

Learn more : https://brainly.com/question/25698028

camera mount that is worn over the shoulders of a camera operator. What is it called?

Answers

It is called a camera stabilizer.
I hope this helped :)

Question # 1 Multiple Select Which features are important when you plan a program? Select 4 options. Knowing what information is needed to find the result. Knowing what information is needed to find the result. Knowing what the user needs the program to accomplish. Knowing what the user needs the program to accomplish. Knowing how many lines of code you are allowed to use. Knowing how many lines of code you are allowed to use. Knowing what you want the program to do. Knowing what you want the program to do. Knowing how to find the result needed. Knowing how to find the result needed.

Answers

Answer:

c

Explanation:

Answer:

Knowing what the user needs the program to accomplish.Knowing how to find the result needed.Knowing what information is needed to find the result.Knowing what you want the program to do

Explanation:

:D

If there are over 1,000 websites about a certain topic, the information is reliable. A. True B. False

Answers

Answer:

If they all have the same answer it is true, but if they are all different check with trusted sources

Explanation:

3 3) Why computer is called non-inteligent , IN Dull machine?

Answers

Answer:

Computers are dull: The CPU is the Central Processing Unit or the brains of the computer. The CPU knows what to do with machine language instructions. It doesn't understand them; it just knows what to do with them.

Explanation:

Hope I could help.

                                 please mark as brainliest

HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!

Answers

Answer:

The explanation is for 10 inputs though. You'd have to follow these steps to find input 50 numbers.

Explanation:

This is how I wrote it in the Plain English programming language which looks like pseudo-code but compiles and runs (to save you all the rest of the steps):

To run:

Start up.

Write "Enter 10 numbers separated by spaces: " on the console.

Read a reply from the console.

Loop.

If the reply is blank, break.

Get a number from the reply.

Add 1 to a count.

Add the number to a total.

Repeat.

Write "The total is: " then the total on the console.

Put the total divided by the count into an average.

Write "The average is: " then the average on the console.

Refresh the screen.

Wait for the escape key.

Shut down.

In order to send and receive packets in the Internet, hosts require an IP address. What are the 2 ways a host can obtain an IP address

Answers

Answer:

Explanation:

An IP address is a 32-bit number. It uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.

IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.

For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32-bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.

These 8-bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.

For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks don't know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.

For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts, you get 192.168.123. Network .132 Host or 192.168.123.0 - network address. 0.0.0.132 - host address.

The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses aren't fixed. Unless you have more information, the network and host addresses above can't be determined. This information is supplied in another 32-bit number called a subnet mask. The subnet mask is 255.255.255.0 in this example. It isn't obvious what this number means unless you know 255 in binary notation equals 11111111. So, the subnet mask is 11111111.11111111.11111111.00000000.

Lining up the IP address and the subnet mask together, the network, and host portions of the address can be separated:

11000000.10101000.01111011.10000100 - IP address (192.168.123.132)

11111111.11111111.11111111.00000000 - Subnet mask (255.255.255.0)

The first 24 bits (the number of ones in the subnet mask) are identified as the network address. The last 8 bits (the number of remaining zeros in the subnet mask) are identified as the host address. It gives you the following addresses:

11000000.10101000.01111011.00000000 - Network address (192.168.123.0)

00000000.00000000.00000000.10000100 - Host address (000.000.000.132)

So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it.

Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:

Decimal Binary 255.255.255.192 1111111.11111111.1111111.11000000 255.255.255.224 1111111.11111111.1111111.11100000

Internet RFC 1878 (available from InterNIC-Public Information Regarding Internet Domain Name Registration Services) describes the valid subnets and subnet masks that can be used on TCP/IP networks.

Hope this helps!

discuss with illustrations how to implement a simple home network ​

Answers

Answer:

How to Set Up a Home Network- Beginners Guide

Today almost every home and small office has a local network, and an Internet connection.

The home network or small area network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.

In this tutorial you will learn how you to build and setup a home or small area network and connect it to the Internet.

Explanation:

Choosing a Wired or Wireless Network

Do You Build a wired or Wireless Network? which is best?

Early (pre 2008) home networks were predominately wired networks.

Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages

Fast typically 100 Mbps to 10 Gbps

Secure and reliable.

Wired Network Dis-Advantages

Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.

Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.

Not so easy for visitors and mobile devices (laptops) to connect to.

Main Uses

It Is best used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).

Turtle graphics windows do not automatically expand in size. What do you suppose happens when a Turtle object attempts to move beyond a window boundary

Answers

When a turtle object attempts to move beyond a window boundary, the turtle object stops because it cannot move outside the window boundary.

The turtle graphics window is simply a graphics window that is used as a playground when drawing turtles.

A turtle object is always in the turtle graphics window.

This in other words mean that, the turtle object cannot exceed the boundaries of the turtle graphics window

An attempt to move the turtle object outside its window will stop the turtle object;

This is so because the turtle object is always in the turtle graphic window, and it cannot move beyond it.

Read more about turtle graphics window at:

https://brainly.com/question/3070883

What is primary difference between the header section of a document and the body

Answers

Answer:

A HTML file has headers and a "body" (payload) — just like a HTTP request. The <body> encapsulates the contents of the document, while the <head> part contains meta elements, i.e., information about the contents. This is (typically) title, encoding, author, styling etc.

Explanation:

CAN I GET BRAINLIEST

F= A· (B+C). draw the symbol for the logic gate​

Answers

Answer:

You need an AND gate and an OR gate.

Explanation:

see picture below

Write a program, using case statements, that mimics a calculator. The program should take as input two integers and the operation to be performed. It should then output the numbers, the operator, and the result. For division, of the denominator is zero, output an appropriate message.

Answers

Answer:#include<iostream>

using namespace std;

int main() {

int var1, var2;

char operation;

cout << "Enter the first number : ";

cin >> var1;

cout << endl;

cout <<"Enter the operation to be perfomed : ";

cin >> operation;

cout << endl;

cout << "Enter the second nuber : ";

cin >> var2;

cout << endl;

bool right_input = false;

if (operation == '+') {

cout << var1 << " " << operation << " " << var2 << " = " << (var1 + var2);

right_input = true;

}

if (operation == '-') {

cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);

right_input = true;

}

if (operation == '*') {

cout << var1 << " " << operation << " " << var2 << " = " << (var1 * var2);

right_input = true;

}

if (operation == '/' && var2 != 0) {

cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);

right_input = true;

}

if (operation == '/' && var2 == 0) {

cout << "Error. Division by zero.";

right_input = true;

}

if (!right_input) {

cout << var1 << " " << operation << " " << var2 << " = " << "Error;";

cout << "Invalid Operation!";

}

cout << endl;

system("pause");

return 0;

}

Explanation:

The capability of moving a completed programming solution easily from one type of computer to another is known as ________. Group of answer choices

Answers

Answer: Portability

Explanation: I hope it helps you!

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow.If the input is:5246810Then the output is:all evenIf the input is:513579

Answers

Answer:

uuuuu

Explanation:

Answer:

57677748957394209690369-34064666

Explanation:

Describe the two problems that appear in the construction of large programs that led to the development of encapsulation constructs.

Answers

Two problems that can lead to the development of encapsulation constructs when creating large programs are the complexity of data and the lack of security in sensitive data.

We can arrive at this answer because:

Encapsulation constructs are designed to prevent data from being invaded by unauthorized person.These constructions must be done without causing inconsistencies in the system, interfering with codes, and increasing the complexity of data. For this reason, large programs that present high complexity and difficult codes, demand the use of encapsulation constructs, so that their data does not become more complex.Encapsulation constructs are also necessary when there are flaws in data security and it is not possible to keep them away from the attack by intruders.

Although there are other ways to accomplish these goals, encapsulation constructs are widely used because of their simplicity and efficiency.

More information:

https://brainly.com/question/13438419

1. Which of the following options can you use to format the contents of a cell?
Select all that apply.
a. Font Size
b. Sort
C. Italic
d. Underline

Answers

Answer:

a

Explanation:

The correct options are A, C, and D. Front Size, Italic, and Underline are the options can you use to format the contents of a cell.

You can also use the keyboard shortcuts Ctrl+B, Ctrl+I, and Ctrl+U to bold, italicize and underline a selection of text.

What is the use of format cells?

You can only alter how cell data appears in the spreadsheet by using cell formats. It's critical to remember that the data's value is unaffected; only how the data is presented has changed. The formatting options include options for fractions, dates, timings, scientific alternatives, and more.

Regular, Bold, Italic and Bold Italic are the four different sorts of font styles. Selected cells or ranges in a worksheet can have their font style changed. Changing the typeface involves the following steps: Pick the cell or cells that need to be changed. The text you want to format should be selected. Go to the Home tab and select Bold, Italic, or Underline. Ctrl + B will bold text. Ctrl + I will italicize text.

Thus, the correct options are A, C, and D.

Learn more about Format cell here:

https://brainly.com/question/24139670

#SPJ2

Design a chip that can complete four bit binary addition, subtraction, and, or operation. Complete the Verilog program and show simulation on Modelsim software , write the program list and screenshot of simulation results.

Answers

Answer:

How am I supposed to design a chip here?

Explanation:

What are the three algorithm constructs?

Answers

Answer:

The algorithm constructs are sequence, decision/selection and repetition.

Explanation:

The three algorithm constructs in C are?

Sequence.Selection.Iteration.

What are three algorithm constructs?

There are known to be 3 basic constructs in an algorithm. They are:

Linear SequenceConditionalLoop

Note that  an algorithm is a combination of instructions for handling a problem or fulfilling a task.

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ2

Kiểm tra cặp số hứa hôn
Đầu vào : số nguyên n,m
Đầu ra : in ra n,m là cặp số hứa hôn và in ra không là số hứa hôn nếu ngược lại

Answers

Answer:

Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you

Ruzwana is a system administrator at an organization that has over 1000 employees. Each of the employees brings their own devices to work. She wants to find an efficient method that will allow her to make the various devices meet organizational standards. In addition, she would like to deploy various universal applications such as the VPN client, meeting software, and productivity software to these systems. Which of the following options should Ruzwana use to achieve the desired outcome in this scenario?
a. A provisioning package.
b. A catalog file.
c. A configuration set.
d. An answer filE.

Answers

In this scenario, the option which Ruzwana should use to ensure that the various devices meet organizational standards and for the deployment of various universal applications is: d. An answer file

An answer file can be defined as an XML-based file which contains the configuration settings and values that should be used during the installation of a software program on one or more devices in accordance with specific standards. Thus, each and every device using the same answer file would have the same configuration setting.

Additionally, an answer file allows a system administrator to automatically deploy various software programs such as meeting software and productivity software to a particular system or network.

In this context, the most appropriate option which Ruzwana should use to ensure that the various devices meet organizational standards and for the deployment of various universal applications is an answer file.

Read more on software here: https://brainly.com/question/25703767

If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles

Answers

There are various ways to resolve conflict. Addressing conflict by the  team manage is by:

Control conflict by expanding the resource base Eliminate conflict by assigning volunteers to another project team.

There are a lot of ways an individual can handle conflict. One of which is to expand the resource base.

Example: Supporting  team manager receives 4 budget requests for $150,000 each. If he has only $200,000 to distribute, there will be conflict at this stage because each group will believe its proposal is worth funding and will not be happy if not fully funded. So the best thing to do is to expand the resources allocated.

The right way to fix this conflict is to tell your volunteers in advance that some of them will not be doing different tasks etc.

See full question below

Capital One invites employees to work on special projects during hackathons. Employees can explore new technologies, rapidly push development forward, or just expand their network to include more colleagues interested in innovation. There's always the possibility that more employees want to participate in the hackathon than there are roles available. If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles? Control conflict by expanding the resource base. Eliminate conflict by assigning volunteers to another project team.Eliminate conflict by avoiding the volunteers. Stimulate conflict by making volunteers compete for the available roles.

Learn more from

https://brainly.com/question/18103914

Choose one piece of information your class can know, but you don’t want to share on your website. Why is it okay for your classmates and teacher to know it, but not to post it publicly?

Answers

Answer:

because other people you dont know can see it and it can sometimes not be good

Explanation:

please help!!!! what is the meaning of M,I,C,R,O,S,O,F,T word?
M-
I-
C-
R-
O-
S-
O-
F-
T-​

Answers

Answer:

Microsoft (the word being a portmanteau of "microcomputer software") was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows

Explanation:

if you need full answer this is it

g The reduced ISA consists of four instructions: What are those instructions and what does each instruction do

Answers

The ISA is run by some set of instructions. This instructions are;

1.  Arithmetic: This Instructions perform various Arithmetic functions

2. Logical:  This instruction often carryout Logical operations on one or more operands.

3. Data transfer: This handles the transfer of instructions from memory to the processor registers and then backward process again.

4. Flow control: These instructions helps in breaking the sequential flow of instructions and jumping to instructions at different locations.  

Instruction set is simply known to be a full combination /number of instructions that are understood by a CPU.

It is know as a machine code that is often written in binary, and shown by assembly language.

Learn more from

https://brainly.com/question/22740965

Discuss some of the reasons you feel that people have for either liking or disliking Excel

Answers

It depends on what you’re talking about liking or disliking like are you talking about food or people

a leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate headquarters is located in Redmond Washington and it has offices in more then 60 countries

Which One Is It

A) Apple
B) Microsoft
C) IBM
D) Global Impact​

Answers

Answer:

B

Explanation:

They have offices in Redmond Washington

Should people who are able to break a hashing algorithm be allowed to post their findings on the Internet?

Answers

Answer:

Cyber security is a very important aspect of digital world. Without cyber security our sensitive data is at risk. Its very important that companies keep our system safe by spotting any security vunerabilities. SO ACORDING TO ME I DO NOT THINK THEY SHOULD BE ABLE TO POST THEIR FINDINGS ON THE INTERNET As it may contain viruses

Big Chungus is god. prove me wrong.

Answers

Answer:

who is Big chungus???

Believe in Lord Buddha !

Other Questions
When the Fed buys federal government securities on the open market from commercial banks, then, over time, the: Teddy1House A is twice as tall as House B. How tall is House B?HouseHeight (ft)A24B what is the LCM of 11 and 7 harry potter or ronald wesley Beethoven's Symphony No. 5 wasanother of his pieces thatA. influenced from then on the way music waswrittenB. he wrote to support himself financiallyC. was not completed before his death. A two-dimensional crystal has a rectangular unit cell, with spacings between the centers of the atoms of 0.5 nm in one direction (e.g., the x direction), and 0.4 nm in the other direction (e.g., the y direction). Presuming that the crystal has 1000 unit cells in each direction, sketch a representative portion of the reciprocal lattice on a scale drawing, showing the dimensions, units, and directions (i.e., kx and ky) Which best compares the governments of Belarus and Germany? If two line are perpendicular which statement is true I think the South is [doomed], but my lot is cast with the South and being unable to manage the ship, I intend to face the breakers manfully and go down with my companions.Jonathan Worth,Letter to D. G. Worth,May 15, 1861Worth says that his lot is cast with the South, meaning that he .Worth is unable to manage the ship, meaning he cannot .With the phrase go down with my companions, Worth is pledging allegiance to . (MC)Ginny the Dog: A Hero Among HeroesHeroes come in many shapes and forms, but they all do uncommon things in unusual situations. They stand out. We've all heard stories of hero dogs that save their owners. One dog saved his owner by fighting off an alligator. Another woke his sleeping family when a fire broke out in its home. Still others rescue injured or needy people in dangerous situations. One dog even managed to call 911 when his owner suffered a seizure. But one dog, named Ginny, performed heroic acts on a regular basis, not just once or twice in unusual situations. Because of her kindness, many lives were saved.Ginny the dog was adopted by her owner from an animal shelter in 1990. Within days of bringing her home, her owner discovered that Ginny seemed to be able to find cats in distress. On her daily walks, Ginny would often find abandoned, trapped, or endangered kittens or cats that needed rescuing. In one such episode, Ginny found a group of kittens trapped in a pipe. She managed to let her owner know, by scratching and barking at the pipe, that something needed her help. Because of Ginny, all the kittens were saved.Almost daily, Ginny would find cats that needed rescuing or, in some cases, a little love. Ginny's owner reported that when Ginny saw a cat on their walks, she would pull away from her leash and run after the cat. Instead of chasing cats like most dogs, Ginny would nuzzle and lick them, giving them comfort. Because of Ginny, her owner soon found he was caring for hundreds of wild neighborhood cats. In addition, Ginny pushed her owner to adopt more than 20 cats, most of whom had permanent injuries or special needs."When we would go to the pound to drop off donations," her owner said, "Ginny always found the cat that was blind or deaf or hurt in some way. She would sit down in front of the cat's crate and not move until we brought it home."What makes a dog behave in such a kind way? Some believe Ginny had a very strong mothering instinct. But how could she tell when a cat was deaf? How did she know which cats needed love and attention? Regardless of how she did it, Ginny rescued hundreds of cats in her life and set an example we all can follow.What is the main purpose of including the story of Ginny wanting to care for blind or deaf cats? To create awareness of the need to give to animal shelters To explain the owner's role in training Ginny To show that Ginny was aware of cats with special needs. To suggest more attention be given to special-needs pets Write your own sentence including a simile or metaphor to describe the following:a happy old man walking down a streetthe feeling of returning home after a long journeythe feeling of going outside on a very cold daychild returning to school after a long holiday. if mammalian cells receive a go-ahead signal at the g1 checkpoint, they will: Plz help I need help What is the largest portion of the brain? Given: y || 2Prove: m5+ m2+ m6 = 180LAM1 123y456 7 zB Kari finds a piece of land that she wants to buy but needs some time to be able to come up with the funds to purchase it. She pays the landowner, Jerry, $10,000 for an option to purchase the property for $200,000 anytime in the next two years. Six months later, Kari purchases the property. Which of the following is not true? a. Kari does not have a recognized gain or loss b. Kari recognizes a $10,000 loss c. Kari's basis in the property is $210,000 d. Jerry's amount realized is $210,000 12 people sharing an 8 gummy worm pieces how much per person will get equally show two ways Gender stereotypes have positive and negative associated social values. A. TRUEB. FALSE Which country experienced the largest percentage change in population between 2010 and 2015? Factor (x^2-9) (x^2-16)