Don is creating a very long document, and he would like to create an introductory page that contains the title of the document and the name of the author along with the date.
What kind of page is Don looking to create?
Blank page
Bibliography
Cover Page
Title page

Answers

Answer 1

Answer:

The answer is "Title page".

Explanation:

Don uses the title page to create it's designed because this page contains basic information like names, dates, titles, and the names of the author.  On this heading tab, it does not have a paper summary, and wrong choices can be described as follows:

The Blank Page is the wrong choice because it doesn't contain any layout.The Bibliography is also a wrong choice because it describes the source of the information.The Cover Page is also a wrong choice because it is also known as the main page it describes the name, the title of the document but it can't contain the date.  
Answer 2

Answer:

d

Explanation:


Related Questions

Imagine you have borrowed your friend's computer to work on a class project. Checking
the computer out, you notice they've left their web browser open and are signed in to
their email account. Would it be considered a computer crime to read their email, even
though you didn't "hack" their password? What if they had left a text file on their
desktop that included personal information, like their social security number, banking
and credit card information, passwords for sites, etc., but didn't have it password
protected-would accessing that file be a computer crime, even though there was no
password protection on it? Explain your answers

Answers

Answer:

Yes.It would be considered as a computer Crime.

Explanation:

This is because you are an unauthorised user

It would be considered a computer crime when one accesses unauthorized information.

What are computer crimes?

Computer crimes are also known as cyber crimes. It ranges from accessing information illegally, committing fraud, phishing, identity theft, and so on.

When a user of a computer accesses information that is unauthorized on the computer, such a user has committed a computer crime. It does not matter whether the accessed information is password-protected or otherwise. If it is not stated categorically that such information can be freely accessed, then accessing it is illegal.

More on cyber crimes can be found here: https://brainly.com/question/24182813

#SPJ2

Processor is used to process the data.
A)true
B)False​

Answers

Answer:

True

Explanation:

If you're talking about CPU (Central processing unit), then you are true. It has no memory at all, all it does is process data. That's why you need RAM and hard drives for memory.

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

1.
The correct way to use a seat belt is

Answers

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

Answer: across your hips, and across your body over your collar bone

Explanation:

that’s how a seat belt should be worn

I have to make a list of 3 ways to prevent infection of an oPC from a virus. Can somebody help me?

Answers

Answer:

Explanation:

dont download random programs, dont turn off windows defender and if you scan your pc weekly

Don’t visit shady links, don’t open emails from unknown senders, Don’t install anything from anyone unless you absolutely trust them.

2 reasons why someone might want to alter data on someone else’s computer

Answers

Answer:

1. Looking at someone else's files.

2. To hack into the bank's computer and wanting to increase the amount in your account.


Write a BASIC PROGRAM to calculate the area of
a triangle whose sides are a, b and c. Area=s(s-a)
(s-b) (s-c), where s = 1/2 (a+b+c)​

Answers

Answer: Do with excel

Explanation:

The principle of symmetrical balance applies only to multiplayer games, not to single-player experiences. (1 point)


True

False

Answers

Answer:

True

Explanation:

I had this on a quiz before and i passed with a 100

Answer:

True was wrong for me so i say false....

Explanation:

                                                               

Suzanne Brett wants to borrow $55,000 from the bank. The interest rate is 6.5% and the term is for 5 years.

What is the yearly payment amount?

Answers

Answer:

$14575

Explanation:

$550006.5%5 years

Total payment amount:

$55000+5*6.5%= $55000 +32.5%= $55000 *1.325= $72875

Yearly payment:

$72875/5= $14575

Answer:

$3,575

Explanation:

Sushant is a new manager and he wants to share his ideas and working protocol with his team.Compare the advantages and disadvantages of oral and written communication and suggest him which form of communication would be more effective.

Answers

Answer:

Advantages of Oral Communication

Use of visual aids like PowerPoint presentation while explaining his ideas and working protocols would help his team to understand him better.There is a spontaneous response from the staff which is more genuine than written response.

Disadvantages of Oral Communication

It could prove to be a problem if Sushant has stage fright or is not an effective communicator, which could form an impression of him by the staff.Staff may forget some of Sushant's words as no memory is as reliable as written information.

Advantages of Written Communication

A well written memo explains the ideas and working protocols that Sushant wants to relay to the staff.There could be a questionnaire for the staff to give feedback.Aims, objectives are clearly stated.

Disadvantages of Written Communication

If the written material is too lengthy, it could be a problem to learn or memorise.

It is recommended that Sushant should use written form of communication to convey his ideas and working protocols as it is more effective.

Other Questions
A buffered solution has a pH of 7.5. What would happen to the pH if a smallamount of acid were added? Which statement best explains why the overall charge on an atom is zero?The positive charge of the neutrons in the nucleus equals the negative charge in the electron cloud.The positive charge of the protons in the nucleus equals the negative charge in the electron cloud.The negative charge of the neutrons in the nucleus equals the positive charge in the electron cloud.The negative charge of the protons in the nucleus equals the positive charge in the electron cloud. where does a collection of a persons registration details be stored once there submitted? How much momentum will a dumbbell of mass 10kg transfer to the floor if it falls from a height of 80cm (assume that the dumbbell stops after hitting the ground) ? Take g=10m/s^2(Point stealers will be reported so better dont do it) Describe a problem you face in your everyday life or at work. How might you use hypothesis testing to find a solution or improvement to that problem? Would you conduct a one-sample or two-sample test? What would be your null and alternative hypotheses? a number when added to its one third gives 96.find the number? Use the triangle shown on the right to complete the statement:_____ (75*)=14.1/xAnswer: cos2nd part: Use the equation shown to solve for the value of x. Round to the nearest tenth.cos(75*)=14.1/x x=14.1/cos(75*)Answer: 54.5 in There are 7 red cards and 13 blue cardsin a deck of cards. If Yuki randomlyselects a card from the deck, what is theprobability that it is a red card? The question at the bottom town B is 40 km due north of town a what is the bearing of a from B Sarah is carrying out a series of experiments which involve using mcreasing amounts of a chemical. In thefirst experiment she uses 6g of the chenucal and in the second experiment she uses 7.8 g of the chemical( Given that the amounts of the chemical used form an anthmetic progression find the total amount ofchemical used in the fust 30 experiments() instead it is given that the amounts of the chemical used for a geometric progression Sarah has atotal of 1800 g of the chemcal avadlable show that the greatest muumber of experiments possible.Satisfies the inequalityand use logarithms to calculate the sale of N write 3/10 as a divison HELP ASAP!Why is it misleading to include too many significant figures in a laboratory report? Think of a modern day person who may suffer from hubris. This person can be a celebrity businessmogul, or someone in your life. Explain why you think their pride is extreme and may lead to their downfall. How did the establishment of "New Rome" contribute to the decline of the Roman Empire? (5 points)It led to civil war within the empire.It created a larger, more expensive army.It slowly drained the treasury.It split the empire into two separate halves. PARA QUE ME AYUDA LA PIRAMIDE DE MASLOW 12. Martina rents a room in her home to guests. She charges a $25 flat fee per night for one person. Additional guests are welcome to stay, but she charges $10 per person. She expects guests to check out by 10 a.m. and charges an extra $5 per hour for late checkouts. Select the linear equation that correctly represents how much Martina collects for one night of stay in her home. A) c = 25 + 10p + 5h B) c = 25 10p 5h C) c + 25 = 10p + 5h D) c = 25 + 10 + 5 Read the theme statement Tori created based on her reading of White Fang. White Fang submits to Grey Beaver because he is afraid of punishment. Has Tori created her theme statement correctly? Yes; Tori has identified a deeper meaning in the story. Yes; Tori has identified a force that motivates White Fang. No; Tori has identified a force that motivates White Fang. No; Tori has identified a deeper meaning in the story. A fair coin is tossed four times. What is the probability that heads (H) will appear at least twice? Which sum does the model below represent?+++OOOOOa. 4+ (-7) = -3b. 4 + 7 = 11c. 8+(-3) = 4d. 11+ (-4) = -3