1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
14

If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be

completed?
importing a style
overriding a style
modifying a style
exporting a style
Computers and Technology
1 answer:
earnstyle [38]3 years ago
8 0
I think it is modifying because that means "Change" which is basically the question
You might be interested in
How does the medium affect the amplitude of sound?
Ratling [72]

The amplitude of a sound energy depends upon the how much energy we are giving to the wave or how much compression on the wave is taking place.

It does’t depends upon the wave length,frequency


7 0
3 years ago
Below is a list of 32-bit memory address references, given as word addresses.
Maru [420]

For a direct mapped cache the general rule is: first figure out the bits of the offset (the right-most bits of the address), then figure out the bits of the index (the next-to right-most address bits), and then the tag is everything left over (on the left side).

One way to think of a direct mapped cache is as a table with rows and columns. The index tells you what row to look at, then you compare the tag for that row, and if it matches, the offsettells you which column to use. (Note that the order you use the parts: index/tag/offset, is different than the order in which you figure out which bits are which: offset/index/tag.)

So in part (a) The block size is 1 word, so you need 0 offset bits (because <span><span><span>20</span>=1</span><span><span>20</span>=1</span></span>). You have 16 blocks, so you need 4 index bits to give 16 different indices (because <span><span><span>24</span>=16</span><span><span>24</span>=16</span></span>). That leaves you with the remaining 28 bits for the tag. You seem to have gotten this mostly right (except for the rows for "180" and "43" where you seem to have missed a few bits, and the row for "181" where you interchanged some bits when converting to binary, I think). You are correct that everything is a miss.

For part (b) The block size is 2 words, so you need 1 offset bit (because <span><span><span>21</span>=2</span><span><span>21</span>=2</span></span>). You have 8 blocks, so you need 3 index bits to give 8 different row indices (because <span><span><span>23</span>=8</span><span><span>23</span>=8</span></span>). That leaves you with the remaining 28 bits for the tag. Again you got it mostly right except for the rows for "180" and "43" and "181". (Which then will change some of the hits and misses.)

5 0
3 years ago
Read 2 more answers
What’s the heardest command that will allow you to copy
lutik1710 [3]
Ummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
8 0
3 years ago
Describe 3 options that are available for the marquee and lasso tools
Dovator [93]
I’m just doing this because why not. Lol don’t read this.
4 0
3 years ago
Which of these is an example of the integrity principle that can ensure your data is accurate and untampered with?
Leokris [45]

Answer:

A: Using Encapsulating Security Payload

B: Using MACs (Message Authentication Codes)

Explanation:

Data integrity means that, the data should be authentic and accurate. This data is not being attempted to change and it is as accurate as sent by the sender. In transmission path different protocols has been used to make sure and maintain the integrity of message or data.

We can perform this by using Encapsulating Security Payload , where the data is encapsulate and hidden between security keys. This protocol ensures the integrity and confidentiality of data between sender and receiver.

MAC (Message authentication Codes) are small codes that are added along with the data while sending by the sender. These codes ensures the data integrity and protect it from the hackers. These codes make sure that data will not changed during transmission.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is false?
    10·1 answer
  • An operating system coordinates the BLANK of a computers operation.
    7·2 answers
  • What are some facts about webmasters?
    10·1 answer
  • What is the full form of w3c
    13·1 answer
  • What is metrical task system algorithm?? and can we use that in online shopping project??
    11·1 answer
  • Reversing the elements of an array involves swapping the corresponding elements of the array: the first with the last, the secon
    6·1 answer
  • Write a method that computes the sum of the digits in an integer. Use the following method header: public static int sumDigits(l
    5·1 answer
  • Help please
    13·2 answers
  • When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second
    7·1 answer
  • Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!