1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
4 years ago
11

Footnotes and endnotes will appear with what type of font formatting?

Computers and Technology
2 answers:
Juli2301 [7.4K]4 years ago
4 0

Answer:

Answer: Subscript

Explanation:

Marina86 [1]4 years ago
3 0
Subscript is what it will appear as
You might be interested in
Write a program that prompts the user to input the decimal value of a double and outputs the number rounded to the nearest integ
KengaRu [80]

Answer:

#include <bits/stdc++.h>

using namespace std;

int main() {

double n;

cout<<"Enter a decimal number: ";

cin>>n;

int Round= floor((n- floor(n))*2);

if(Round==0)

{

n= floor(n);

}

else n= ceil(n);

cout<<n;

return 0;

}

5 0
4 years ago
Which kind of image is indispensable and needs added text to go with it?
madreJ [45]

Answer:

A chart and a graph are kind of image that are indispensable and need added text to go with it.

4 0
3 years ago
If you want to implement fault-tolerance on your network, what type of raid would you use on the drives that contain the os and
antoniya [11.8K]

Answer: RAID 1

Explanation:RAID 1 is the type of raid that gets invoked by the help of two disks and also keeps the record that the disk does not fail. It works by duplicating the data by the mirroring effect in the disks.

It has the property of reviving the data as quick as possible and also has high speed working due to the many drive thus has high error tolerance.Thus RAID 1 is the appropriate raid.

6 0
3 years ago
________ is the concept describing the difference between people who have easy access to technology and those who do not.
earnstyle [38]

Answer:

The answer is Digital divide.

Explanation:

Digital divide describes the differences between people with access to the internet, computers or modern ICT or Information Communication Technology and the people that do not.

The effect of digital divide is described below:

  1. It affects economic growth. Due to a lack of access to technology in some areas, they experience low economic growth and cannot be compared to areas with easy access to technology.
  2. It affects education. Students with easy internet access and other technological facilities always have information at the tip of their fingers compared with students who only go to the libraries or listen to the radio to get information.
  3. It affects Political participation. Access to technology increases the citizen's participation in politics while it has a negative effect on places with no access to technology.
5 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Other questions:
  • The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: St
    6·1 answer
  • This is important I need help please
    14·1 answer
  • Which building-block feature is available in the Text grouping on the Insert tab?
    14·1 answer
  • Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
    12·2 answers
  • Which payment method typically charge is the highest interest rates?
    12·1 answer
  • In JAVA please:
    15·1 answer
  • Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
    7·1 answer
  • PLZZZZ HELPPP and please don’t send a link , Explain how the processing stage contributes to a computer creating an output.
    8·1 answer
  • Draw DFD diagram for phone sales. Help me. Thanks
    12·1 answer
  • Harry needs to make a presentation on packaging prototypes for a new product. Which presentation software elements can be use to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!