Match the following Word options to the tab where it is located:
I. download a template
II. apply a theme
III. apply a style
IV. invoke synchronous scrolling
V. combine two documents
A. File tab
B. View tab
C. Home tab
D. Design tab
E. Review tab
A, D, C, B, E
Computer Science & Information Technology
You might also like to view...
The Passkey is used in Bluetooth Security to limit outsider access to the pairing. Only people with the Passkey will be able to pair with your Bluetooth device. Pairing units with the wrong (select one of the following) will not be able to pair.
What will be an ideal response?
Computer Science & Information Technology
Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code.
A. blended B. combined C. mixed-up D. included
Computer Science & Information Technology