1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
4 years ago
12

A ____ is text and graphics that print at the bottom of every page.

Computers and Technology
1 answer:
oksano4ka [1.4K]4 years ago
6 0
Foot note, or footer.
You might be interested in
Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
kodGreya [7K]

Explanation:

The main reason why is because regular users don't have permission to write to /etc. Assuming this is Linux, it is a multi-user operating system. Meaning if there are user-application configuration files within /etc, it would prevent users from being able to customize their applications.

6 0
4 years ago
If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
tatuchka [14]

According to you have to http://windows.microsoft.com/en-PH/windows-8/sign-in-out-of-windows you have to click on the account picture on the upper right hand corner to access the backstage view and you have to tap or click the account tab to view the account gallery and sign out from the account. You may also want to check this link as well: https://support.office.com/en-us/article/Sign-out-of-your-Microsoft-account-268b49c8-398f-4057-8a3f-e376789f273a

<span> </span>

3 0
4 years ago
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
3 years ago
What is BPM in rythm games?
alina1380 [7]

Answer:

BPM: Beats Per Minute.

Explanation:

4 0
3 years ago
Which ribbon tab is not a default in Outlook 2016's main interface?
Verizon [17]

Answer:

review

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • Which of the following statements is TRUE?
    11·2 answers
  • Which is a disadvantage ofsimulation?
    5·1 answer
  • All of the following statements about logistics information systems (LIS) are true except ________.
    14·1 answer
  • Examine the following algorithm.
    9·1 answer
  • What the best option if you cant show your PowerPoint presentation at all
    6·2 answers
  • Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,
    7·1 answer
  • Does anybody know how to fix my Minecraft??? My character isn’t loading and realms aren’t working?? Look at the picture!
    5·1 answer
  • Write a program that creates a two-dimensional array initialized with test data. Use any data type you wish. Declare a two-dimen
    9·1 answer
  • You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!