What are the different options in a page layout feature ? Select three options

Answers

Answer 1

Answer:

Half Center Right Left, theres four

Explanation:


Related Questions

Which network protocol is used to handle the Reliable delivery pf information

Answers

Answer:

TCP

Explanation:

TCP is a reliable transport protocol, and performs processes to ensure reliable delivery of data between applications using acknowledged delivery.

Spam is _____.
an example of an ethical use of email
a set of rules that you should follow when sending e-mail
the practice of sending unwanted messages to a large group of people
a type of attachment
multiple answers

Answers

Multiple answers. Attachment and practice of sending unwanted messages
Spam is the practice of sending unwanted messages to a large group of people.

Which statement does not describe desktop publishing?
DTP is the same as WP.
DTP features are included in most WP programs.
DTP enables workers to produce documents that improve communication,
DTP lets you resize and rotate text.

Answers

Answer:

DTP is the same as WP.

Explanation:

Desktop publishing can be defined as a graphical design process which typically involves the creation of a printable document such as magazines or newspapers, through the use of special software programs or applications and a printer.

The following statement best describes desktop publishing;

DTP features are included in most WP programs.

DTP enables workers to produce documents that improve communication,

DTP lets you resize and rotate text.

In which of the following ways are copyrights different from trademarks?

It is illegal to use a copyrighted work without the author's permission, but not a trademark.

It is more difficult to register a copyright than to obtain a trademark.

It is illegal to use a trademark without the author's permission, but not a copyrighted work.

It is more difficult to obtain a trademark than to register a copyright.

Answers

It is more difficult to obtain a trademark than to register a copyright.

Answer:

Copyrighted materials can be used under fair use laws, while trademarked materials cannot.

Explanation:

What is the output of this program? age=4 if age >5: print (“more”) else: print (“less”)

Answers

Answer:

less

Explanation:

The input is 4, a number that is not greater than 5. So as a result, it will print "less".

Does anyone know anything about the difference between analog and digital signals?
I don't understand it and I have to write an entire essay about it. Any information would help.

Answers

An analog signal is a continuous signal whereas Digital signals are time separated signals. Analog signal is denoted by sine waves while It is denoted by square waves. ... Analog signals are suited for audio and video transmission while Digital signals are suited for Computing and digital electronics.

An analog signal is a continuous signal whereas Digital signals are time separated signals. Analog signal is denoted by sine waves while It is denoted by square waves. ... Analog signals are suited for audio and video transmission while Digital signals are suited for Computing and digital electronics.

The space between the margin
and start
of paragraph is called

Answers

Answer:

The space between the margin and start of paragraph is called an indent OR Indentation.06

Explanation:

Introduction To Micro-Technology
Computer Science Assignment/Project
Course Title: Micro-Soft Excel
AD
BG
LE
Sal
Ady
175
30
59
88
117
146
175
204
233
262
291
320
ID
001
002
003
004
005
006
007
008
009
010
Namc
Sanita Cully
Saah Kpakar
Rudolph Gayflor
Francis Yoryor
Adolphus Naigar
Moses Gay gay
Philip Kuoper
Simon Momno
David Brown
John Yankar
CJ
Hr.
Work
178
180
145
160
185
150
182
186
190
120
DM
IIr.
Rate
8
6
S
4
7
9
10
12
14
15
EP
Reg.
Pay
300
350
325
250
275
340
345
FS GV
Over Gross
Time Pay
115 450
100 500
75 475
50 485
40 425
30 430
35 435
20 375
25 490
80 585
HY JC
Inc. SS
Tax Tax
10.20 20.04
11.75 21.00
12.30 21.06
15.05 22.00
22.08
10.00 23.00
15.75 23.10
17.22 24.00
20.05 24.12
20.00 26.00
17.05
181
141
161
186
151
183
187
191
121
200
TI
380
400
1. Direction: List the Relative, Absolute and Mixed Cell References of the following figures
in the above table:
i. 180
ii. 25
ili 175
iv. 183
V 6
2. State the meanings of the three types of cell references.
3. Assume that you were asked to find Average, Total Number of Students, Maximum,
Minimum and Product. What are the terms used in finding the above within the database?
4. Looking at the cell reference of Status will respect to commission; build a cell reference
stating that if sales which is B7, Less than 800, the rate is 2% below is 1% and state if it
is true or false.
5. Slate the steps of Deleting and Inserting Row.​

Answers

Answer:

i need more

Explanation:

i need more

can change the tab colors of the worksheets in excel

Answers

Answer:

right-click the tab, point to Tab Color and pick a color that you want. Tip: Click away from the formatted tab to see the new tab color. If you want to remove the color, right-click the tab, point to Tab Color, and pick No Color

What’s the best Wi-Fi name you’ve seen?

Answers

Answer:

etisalath is the best wifi name

Bill Wi the Science Fi.

1. name of industry credential available to students taking this class

2. two reasons for acquiring the industry credential

Answers

Answer:

Explanation:

I need points to ask questions

How do you enter the decimal 73 into the computer?

Answers

Answer:

Step-by-step how to convert decimal number 73 to binary. ... Step 4) Write down the Remainders in reverse order to get the answer to 73 as ...

The following is a partial overall list of some of the sources for security information: • Security content (online or printed articles that deal specifically with unbiased security content)

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)
• Vendor content (material from security vendors who sell security services, hardware, or software)
• Security experts (IT staff recommendations or newsletters)
• Direct instruction (college classes or a workshop conducted by a local computer vendor)
• Friends and family
• Personal experience

Required:
Create a table with each of these sources and columns listed Advantages, Disadvantages, Example, and Rating.

Answers

Answer:

Kindly check explanation

Explanation:

SOURCE OF SECURITY INFORMATION :

• Security content (online or printed articles that deal specifically with unbiased security content)

ADVANTAGES :

Target based on highly specific to certain aspects

DISADVANTAGES :

They usually cover limited aspects

RATING : 4

SOURCE OF SECURITY INFORMATION :

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)

ADVANTAGES :

Offers greater level of accessibility

DISADVANTAGES :

They aren't usually curated and thus may be inaccurate

RATING : 6

SOURCE OF SECURITY INFORMATION :

• Vendor content (material from security vendors who sell security services, hardware, or software)

ADVANTAGES :

Accurate information and tips

DISADVANTAGES :

Usually involves a fee

RATING : 3

SOURCE OF SECURITY INFORMATION :

• Security experts (IT staff recommendations or newsletters)

ADVANTAGES :

Accurate and vast tips

DISADVANTAGES :

Not much

RATING : 5

SOURCE OF SECURITY INFORMATION :

• Direct instruction (college classes or a workshop conducted by a local computer vendor)

ADVANTAGES :

Highly specific

DISADVANTAGES :

They usually cover limited aspects

RATING : 2

SOURCE OF SECURITY INFORMATION :

• Friends and family

ADVANTAGES :

Cheap

DISADVANTAGES :

May be biased and inaccurate

RATING : 7

SOURCE OF SECURITY INFORMATION :

• Personal experience

ADVANTAGES :

Grows continuously with time

DISADVANTAGES :

Limited in nature

RATING : 1

excuse me can i help 1) what is computer? Define about Accuracy and
Data storage.​

Answers

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. ma pani nepali

You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest customers. The email says your company is overbilling the customer and asks that you examine the attached invoice. You do but find it blank, so you reply politely to the sender asking for more details. You never hear back, but a week later your security team tells you that your credentials have been used to access and exfiltrate large amounts of company financial data. What kind of attack did you fall victim to?A. A fly phishing attackB. A shark attackC. As a phishing attackD. As a whale attack

Answers

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

How can I be future ready (in terms of careers and in general)?

This is for school


Please provide at least 3 reasons with evidence, and make sure they are not personalized towards you; just provide a general overview

Thanks, appreciate it.

Answers

Answer:

being ready to take care of yourself and getting high scores

Explanation:

you will have to have high scores to get a good job or even start a business you wont have somone to take care of you if your 26 like your a boss

What is information

Answers

Information is a set of facts about a topic or a group of details about something

Answer:

The definition of information is news or knowledge received or given. An example of information is what's given to someone who asks for background about something. Information is the summarization of data. Technically, data are raw facts and figures that are processed into information, such as summaries and totals.

This may range from content in any format – written or printed on paper, stored in electronic databases, collected on the Internet etc.

Explanation:

*Flip's the table and moonwalk's out*

What Are the Various Broadband Internet Connections? *​

Answers

Answer:

This is your answer

Answer:

Types of Broadband Connections

Digital Subscriber Line (DSL) Cable Modem. Fiber. Wireless. Satellite. Broadband over Powerlines (BPL)

Hope this helps you. Do mark me as brainliest.

Binary Search:


2 6 15 42 55 89 111 256

Answers

Answer:

2 =  10

6 = 110

15 = 1111

42 = 101010

55 = 110111

89 = 1011001

111 = 1101111

256 = 100000000

TRUE OR FALSE YOU VERIFIED BRAINLIST​

Answers

Answer: 6. False

7. True

8. True

9. True

10. False

Explanation:

6. This is false. Cnidarians are aquatic animals that can be found in marine environments. They aren't wormlike. Examples are corals and jelly fish.

7. Snails, clams, oysters, squid and octopuses are mollusks. They're invertebrates and usually live in water.

8. True. Invertebrates are the animals that don't have backbone unlike the vertebrates that has backbone. Examples of invertebrates are snail, earthworm etc.

9. True. The Arthropods are known to be the largest group in the animal kingdom. They include insects, millipedes, crabs, lobsters, spiders, mites, centipedes, etc.

10. False. The crustacean doesn't have one pair of leg per segment.

Answer:

This guy has been scamming peoples questions. He doesnt deserve good grades

Explanation:

Learning Management Systems (LMS) allow students to interact with each other, but NOT their teachers.

Answers

Answer:

what do you mean friend not for teacher

Answer:

Explanation:

Communication outside the classroom can be facilitated through discussion forums, real-time messaging, video-conferencing, email and announcement posts.

What is Creaite and how does it work?

Answers

Creatine is a natural substance that turns into creatine phosphate in the body. Creatine phosphate helps make a substance called adenosine triphosphate.

Answer:

Creatine is a substance that is found naturally in muscle cells. It helps your muscles produce energy during heavy lifting or high-intensity exercise.

Explanation:

Taking creatine as a supplement is very popular among athletes and bodybuilders in order to gain muscle, enhance strength and improve exercise performance

Why can’t a computer use source code

1.trick question but computers do use source code

2.source code is only available as a web app

3.source is legacy

4.source code is not 1 or 0

5. It van, but source code générally requires an expensive software license

Answers

Answer:

A computer can use a source code

Explanation:

The code that was copied

gets compiled by the terminal and

gets its traced erased

therefore there is no need to give

credit and code still used in proccess

Example:

You can get a source code from stackoverflow

github, you can use that code to build your website

giving no credit to the owners of that code

the code will get its traced erased by the compiler

A computer can use a source code

Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type unsigned char. Read two int values p and k from the keyboard, where the values are less than 8. Replace the n bits of the first variable starting at position p with the last n bits of the second variable. The rest of the bits of the first variable remain unchanged. Display the resulting value of the first variable using printf %x.Test Cases:n = 3;p=4;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: f (0000 1111)n = 2;p=5;input: a= 0x1f (0001 1111) b = c3 (1100 0011); output: 3f (0011 1111)

Answers

Solution :

#include  [tex]$<\text{stdio.h}>$[/tex]

#include [tex]$<\text{string.h}>$[/tex]

#include [tex]$<\text{stdlib.h}>$[/tex]

//Converts [tex]$\text{hex string}$[/tex] to binary string.

[tex]$\text{char}$[/tex] * hexadecimal[tex]$\text{To}$[/tex]Binary(char* hexdec)

{

 

long [tex]$\text{int i}$[/tex] = 0;

char *string = [tex]$(\text{char}^ *) \ \text{malloc}$[/tex](sizeof(char) * 9);

while (hexdec[i]) {

//Simply assign binary string for each hex char.

switch (hexdec[i]) {

[tex]$\text{case '0'}:$[/tex]

strcat(string, "0000");

break;

[tex]$\text{case '1'}:$[/tex]

strcat(string, "0001");

break;

[tex]$\text{case '2'}:$[/tex]

strcat(string, "0010");

break;

[tex]$\text{case '3'}:$[/tex]

strcat(string, "0011");

break;

[tex]$\text{case '4'}:$[/tex]

strcat(string, "0100");

break;

[tex]$\text{case '5'}:$[/tex]

strcat(string, "0101");

break;

[tex]$\text{case '6'}:$[/tex]

strcat(string, "0110");

break;

[tex]$\text{case '7'}:$[/tex]

strcat(string, "0111");

break;

[tex]$\text{case '8'}:$[/tex]

strcat(string, "1000");

break;

[tex]$\text{case '9'}:$[/tex]

strcat(string, "1001");

break;

case 'A':

case 'a':

strcat(string, "1010");

break;

case 'B':

case 'b':

strcat(string, "1011");

break;

case 'C':

case 'c':

strcat(string, "1100");

break;

case 'D':

case 'd':

strcat(string, "1101");

break;

case 'E':

case 'e':

strcat(string, "1110");

break;

case 'F':

case 'f':

strcat(string, "1111");

break;

default:

printf("\nInvalid hexadecimal digit %c",

hexdec[i]);

string="-1" ;

}

i++;

}

return string;

}

 

int main()

{ //Take 2 strings

char *str1 =hexadecimalToBinary("FA") ;

char *str2 =hexadecimalToBinary("12") ;

//Input 2 numbers p and n.

int p,n;

scanf("%d",&p);

scanf("%d",&n);

//keep j as length of str2

int j=strlen(str2),i;

//Now replace n digits after p of str1

for(i=0;i<n;i++){

str1[p+i]=str2[j-1-i];

}

//Now, i have used c library strtol

long ans = strtol(str1, NULL, 2);

//print result.

printf("%lx",ans);

return 0;

}

Oliver is working for a team that uses object-oriented concepts to design software. Which language would they use to develop this software?

Answers

Answer:

Probably C++

Explanation:

The language must be object oriented. This narrows it to something like Java or C++. Java is fine for application development, but has a compiler and interpreter whereas C++ only has a compiler.

Given that, x = 2, y = 1, and z = 0, what will the following cout statement display?

cout << "answer = " << (x || !y && z) << endl;

Answers

Answer:

This will return 1

Code:

#include <iostream>

using namespace std;

int x = 2;

int y = 1;

int z = 0;

int main() {

   cout << (x || !y && z) << endl;

   return 0;

}

Does analogue conversation take place in source as transmitter?

Answers

Answer:Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals that have continuous electrical signals, while digital signals have non-continuous electrical signals.

Explanation:

When a tape deck is plugged into recording equipment, the analog cassette tape is transformed into a digital equivalent.

What is the analogue conversation in source as transmitter?

An analog media is a tangible, changed thing that stores music. For instance, to record sound on a cassette tape, a tape recorder modifies the magnetic properties of magnetic tape.

Signals containing information often come in the form of analog and digital signals. The primary distinction between the two signals is that analog signals have continuously varying electrical signals, but digital signals do not.

And no source coder or channel coding are used at the transmitter side; just this occurs there.

Therefore, The channel's signal is picked up at the receiver's end and sent through a demodulator before being approximated to be the original information signal.

Learn more about analogue conversation here:

https://brainly.com/question/24750760

#SPJ2

Microsoft
Comments are added through the ____________________________ tab on the ribbon. [Add Comments]
Question 1 options:

Home

Help

Review

View

Answers

I believe it’s review

Comments are added through the review tab on the ribbon. The correct option is c.

What are tabs and ribbons in Microsoft?

The animation tab in the PowerPoint ribbon is distinct from other office suites like word, excel, outlook, publisher, etc. Since animation can use in PowerPoint to make your presentations animated, you can manage all of your animation settings in the animation tab.

Many of your most important functions in Microsoft Word are available on the ribbon, allowing you to do them without accessing any menus. To improve efficiency, you can modify this ribbon as you see fit.

A new screen containing options for opening, saving, printing, sharing, and dismissing a file is displayed when you click the File tab. Groups of commands are displayed above the currently open document on the other Ribbon tabs.

Therefore, the correct option is c, Review.

To learn more about tabs and ribbons, refer to the link:

https://brainly.com/question/10015755

#SPJ2

Write a C++ program to read from the user an integer number of 4 digits and display it in reverse order. For example, if the input is 5723 the output should be 3275. (Hint use / and %). The program should display “Invalid input” if the input value is not a 4 digits number.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

 int n, reversedNumber = 0, remainder;

 cout << "Enter a number: ";

 cin >> n;

 int length = to_string(n).length();

 if (length == 4){

   while(n != 0) {

     remainder = n%10;

     reversedNumber = reversedNumber*10 + remainder;

     n /= 10;

   }

   cout << "Reversed Number = " << reversedNumber << endl;

 }

 else{

   cout << "Invalid Input!" << endl;

 }

 return 0;

}

Explanation:

So, it's pretty easy. It finds the remainder to reverse the number and for the invalid input part, you convert the input into a string and then use .length() to find the length. Then you can reverse the number and show whatever output

Answer:

#include <iostream>

using namespace std;

int main() {

int n, reversedNumber = 0, remainder;

cout << "Enter a number: ";

cin >> n;

int length = to_string(n).length();

if (length == 4){

  while(n != 0) {

    remainder = n%10;

    reversedNumber = reversedNumber*10 + remainder;

    n /= 10;

  }

  cout << "Reversed Number = " << reversedNumber << endl;

}

else{

  cout << "Invalid Input!" << endl;

}

return 0;

}

Explanation:

So, it's pretty easy. It finds the remainder to reverse the number and for the invalid input part, you convert the input...

Explanation:

d. A................ usually contains detailed comments about something in the text.
i. Footer
ii Footnote
Hii Header
iv. none of these​

Answers

Answer: Foot note

Explanation:

The option that contains detailed comments about something in the text is simply referred to as the foot note.

A footnote is simply refered to as the note that is at the bottom of a particular page which gives more information about a particular thing.

Therefore, based on the options given, the answer is B.

Other Questions
The awnser to a multiplication problem X+3y=-2 3x+4y=-6 USE SYSTEMS BY SUBSTITUTION. X=Y= Why do you think there are so many different kinds of can openers? BRAINLIEST FOR BEST ANSWER! 25 POINTS! pls help! question in the picture! Please help Ill give brainlieast Parent traits are always expressed in offspringO TrueO False PLEASE HELP/ WILL MARK BRAINLIESTFind the surface area of the triangular prism. Read the problem.Sara and Elizabeth have exchanged 60 text messages. Sara sent 42 of the messages.Shade the grid to show the fraction of the text messages that Sara sent.What percent of the text messages did Sara send? You can use your model to help. Who made this painting? What is the last step of the State level court system? PLEASE HELP ME I WILL GIVE 25 POINTS PLUS BRAINLIEST URGENT PLEASE HELP! help help please thank you Most of the people of the Congo come from the __group of people The teacher gave 36 gold stickers to the first student, 45 gold stickers to the second student, 54 gold stickers to the third student, and 63 gold stickers to the fourth student. If this pattern continues, how many gold stickers will the teacher give to the fifth student? I need help with this problem please Round 3.44570830811 to the nearest hundred-thousandth. A deli offers bag lunches with 2 bread choices and 3 meat choices, as shown in this tree diagram. What is the probability that someone will randomly choose a turkey sandwich? There were no Whites in the abolition movement (TRUE OR FALSE) What 3D figure is a paper towel carboard tube? What does the underlined word mean in the following sentence? Le puedo dejar un mensaje a Amalia? O a message O an invite O a thanks o a messenger un mensaje is underlined