1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
9

What are the features of the Outline view in Word? Select three options.

Computers and Technology
1 answer:
Lynna [10]3 years ago
5 0

Answer:

A,B,C

Explanation:

Outlines can be used in different ways:

1) to create the structure of a new document by manipulating Headings

2) Help to navigate across large document

3) Display the text or an abstract of the content with Headers

You might be interested in
What is ana absolute adress
AleksAgata [21]

Answer:

The term <u>absolute</u> distinguishes it from a relative address, which indicates a location specifying a distance from another location. <u>Absolute addresses</u> are also called real addresses and machine addresses.

Explanation:

Sorry, I'm not so good at explaining things.. I hope I kinda gave you an idea on what it is though.

8 0
4 years ago
What is a alt key and how does it work
Sever21 [200]
A key on a keyboard that when pressed at the same time as another key gives the second key an alternative function.
4 0
4 years ago
Read 2 more answers
I will give brainliest !!
OverLord2011 [107]
Do these questions have given answers already?
3 0
3 years ago
The type of meter used to test downstream digital signal quality
Levart [38]
I would say digital modulated signals  <span />
3 0
4 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Other questions:
  • How has information technology made piracy possible?
    6·1 answer
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • Which of these consoles have 64 bit architecture
    13·1 answer
  • In a period of steep increases in interest rates, which issuer is most likely to be negatively affected? A Trucking company B Ut
    9·2 answers
  • When converting the relationships to the relational model and the database schema, it is possible that some of the relationships
    15·1 answer
  • ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently
    13·1 answer
  • Place the steps in order for adding an additional email account in outlook
    12·1 answer
  • SHORT ANSWERS:
    7·1 answer
  • Check your knowledge
    9·1 answer
  • Difference between authentication and authorization.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!