1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
4 years ago
8

To open the format cells dialog box with the alignment sheet active, tap or click the alignment settings ____.

Computers and Technology
1 answer:
Otrada [13]4 years ago
3 0
<span>To open the format cells dialog box with the alignment sheet active, tap or click the alignment setting button
</span>
You might be interested in
What does phishing mean?
Ilya [14]
<span>the activity of defrauding an online account holder of financial information by posing as a legitimate company

</span>
8 0
3 years ago
Read 2 more answers
Jason Is Working On A Video Science Project. As He Is Working On It, He Saves The Project.
zubka84 [21]
I think the problem here is either you don't have enough space and power to run this with your file or the file its self is too large if that's not the case try to google it and look for techisky for help
7 0
4 years ago
How do you do these two questions? The first might have multiple answers and the second will have only one answer.
Svetlanka [38]

Answer:

1. Generally Linkedlist is used, but you can also use the queue. Hence both linked list are queue are correct options. However, treeset is sorted and hashset is not sorted, and hence we cannot make use of the treeset. Similarly the stack cannot as well be used as a Hashset.

2. D. Additional cells in the same hashset are examined and the index is incremented by a fixed value each time.

Explanation:

The 2 deals with the linear probing, and what is meant as option in 2 is what we know as linear probing in hashset, and we do have quadratic probing and double probing as well.

6 0
3 years ago
As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
aleksklad [387]

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
5 0
3 years ago
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
Other questions:
  • Which of the following functions does a browser perform?
    5·1 answer
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace
    14·1 answer
  • PLZ HELP
    15·2 answers
  • Javier is asked to explain to IT management as to why he is suggesting replacing the existing company firewall. Javier states th
    11·1 answer
  • Is this very epik or not?
    9·2 answers
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • Heyyyyyy<br> byeeeeeeeeeeeeeeeeeeeeeee
    15·2 answers
  • What are the common uses of joysticks? ​
    12·1 answer
  • How did people figure qwerty keyboard set up, instead of the abcdef setup?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!