1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
10

Which best describes inserting a table using the Table Gallery

Computers and Technology
2 answers:
LenaWriter [7]3 years ago
8 0
The table helps guid you on how to make a table

balandron [24]3 years ago
4 0
The table gallery is to help you create the table.
You might be interested in
Lactic acid (ch3ch(oh)cooh) has one acidic hydrogen. a 0.10 m solution of lactic acid has a ph of 2.44. calculate ka.
sammy [17]

The answer is : Ka=0.000137

HA -> H+ + A-

0.10 x x

0.10-x +x +x

[H+]= 10^-2.44 = 0.00363

x= 0.00363

(0.00363)(0.00363)/(0.10-0.00363) = 0.000137

Ka=0.000137

5 0
3 years ago
What function would be used if you want to compare all other rows with the first row?
tester [92]

Answer:

B

Explanation:

the person at the very top said so :)

6 0
3 years ago
3. An organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that ex
lesya [120]

Answer:

The correct answer is: 255.255.255.192.

Explanation:

A subnet mask complements an Internet Protocol (IP). Thanks to subnet masks IP addresses can be identified because they seem to be all the same but the subnet mask avoids confusion. If four subnets are to be created for the IP 192.168.90.0 3 bits of that IP must be used to create the subnet resulting in 255.255.255.192. Then:

  • <em>Number of subnets</em>: 2^{3} - 2 = 6
  • <em>Number of hosts per subnet</em> = 2^{5} -2  = 30
3 0
3 years ago
Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance
lara [203]

Answer:

public class Leo{

public String method1(){

return "Jack 1 Leo 1";

}

public String method2(){

return "Don 2 Jack 2";

}

public String method3(){

return "Jack 3 Leo 3 Don 2";

}

public String toString(){

return "Jack 3 Leo 1"

}

}

public class Jack extends Leo{

}

Explanation:

Leo is the parent class and jack inherits all of its attributes from Leo

So when you call the following code in the main method:

Jack j = new Jack();

System.out.println(j.method1);

it should print Jack 1 Leo 1

This is because the program first checks if method 1 exists in the Jack class

Because it doesn't exist it then goes to the parent class which is Leo.

And in the Leo class method1 displays "Jack 1 Leo 1 "

So it prints that

8 0
3 years ago
A network administrator had his entire network converted into a botnet. Which type of malware infection is most likely responsib
Scorpion4ik [409]

Answer:

worm

Explanation:

Computer worm -

It is a malware program which is illegally or secretly added to the system of the host computer , and then further multiplies and spread to other computer , is known as a computer worm.

Worm can very cause a huge harm to the network of the computer.

Hence, from the given scenario of the question, the correct term for the given information is computer worm .

5 0
3 years ago
Other questions:
  • In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
    13·1 answer
  • Can someone please help me with this question??
    12·1 answer
  • if you're using the paintbrush tool and want to change the color of the paint being used what should you change
    9·2 answers
  • You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and s
    13·1 answer
  • Each web site contains a(n) ____ page, which is the first document users see when they access the site.
    9·1 answer
  • 20 POINTS!!!!!!!!!! will give brainliest
    8·1 answer
  • 0111101101010110101110110001001011101001011101101010101010110101
    14·1 answer
  • Which three major objects are built into the JavaScript language?
    12·2 answers
  • Which storage is faster than secondary storage​
    14·2 answers
  • How important are operating system in our devices?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!