1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
8

How do I take off the header off my second page in google docs ? ( I only need it on page 1)

Computers and Technology
2 answers:
Alecsey [184]3 years ago
4 0

Add or change headers & footers

Open a document in Google Docs.

In the top left, click Insert Header & page number.

Choose Header or Footer.

Enter text into the header or footer.

To make the first page header or footer different from the other pages, check Different first page header/footer.

iragen [17]3 years ago
3 0
You cant headers are applied to every page. Apply your header under the header
You might be interested in
Q. Describe the T.V. as an ICT tool.​
Vikentia [17]

Answer:

TV or modern televisions are also a type of ICT tool because we get a wide amount of information about mass communication through the various news channels on the TV. TV is now also the most popular as well as a cheap medium of mass communication.

3 0
3 years ago
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically lo
slamgirl [31]

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

4 0
3 years ago
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the D
jasenka [17]

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

8 0
3 years ago
What is better for a samsung tab a7 a 32 gb or 64
ad-work [718]

Answer:

I think 64 GB

Explanation:

64 GB would give you more ram and more storage which means you can get more apps or take more photos on there. 32 GB is good but you have to remember that system data takes up a significant amount of storage so you shouldn't get that. I'd say 64 GB would be the best.

5 0
3 years ago
In order for you to realize there has been a sensory change, it has to reach the __________ level of processing.
Kryger [21]

Answer: In order for you to realize there has been a sensory change, it has to reach the <u>perceptual</u> level of processing.

6 0
4 years ago
Other questions:
  • Which tool should Jules use to encourage her reader's interaction on her website? Jules should use the ________ tool to encourag
    5·1 answer
  • DG Loans, a mortgage lender, was charged with a discrimination lawsuit. It alleged that the company was offering loans at higher
    13·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • Which commonly used animation effect makes text on a slide appear in the presentation?
    9·1 answer
  • A ________ determines what cpus a system can use, what integrated ports the system can provide without use of third-party produc
    5·1 answer
  • Why do we say that IP provides ""best-effort"" service?
    11·1 answer
  • To simplify input management, you are asked, neglecting the handling of exceptions, to write a keyboard class so that the input
    11·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • What is a web browser​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!