1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
8

What is indentation?

Computers and Technology
2 answers:
horrorfan [7]3 years ago
3 0

Answer:

B

Explanation:

Yuki888 [10]3 years ago
3 0

Answer:

The answer would be B.

Explanation:

Because when you indent the words move to the right.

You might be interested in
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
Mila [183]

Answer:

(A)AES

Explanation:

WPA2 (Wi-Fi Protected Access 2) is a security protocol which was developed by the Wi-Fi Alliance in 2004. It was used to replace the security protocol of WEP(Wired Equivalent Privacy) and WPA.

Unlike the previous security protocol, WPA2 uses the Dvanve Encryption Standard (AES) instead of the RC4 stream cipher. WPA3 has been developed but it is not yet widely in use.

4 0
3 years ago
Keyboards and printers are two examples of _________ devices.
galben [10]
Input device your welcome
8 0
3 years ago
What is one disadvantage people face without a checking account?
sveticcg [70]

Answer:

If they have a job that only pays with ckecks they won't be able to have their paycheck.

Explanation:

8 0
3 years ago
A data flow cannot go directly back to the same process it leaves. There must be at least ________ other process(es) that handle
Flauer [41]

Answer:

Answer is A. One.

Refer below.

Explanation:

A data flow cannot go directly back to the same process it leaves. There must be at least one other process that handle(s) the data flow, produce(s) some other data flow, and return(s) the original data flow to the beginning process.

3 0
3 years ago
What data unit is addressed based on the IP address of the recipient?
erica [24]

Answer:

packet

Explanation:

7 0
3 years ago
Other questions:
  • What is one course of action available in every problem solving process?
    9·2 answers
  • Who were called “freedmen” during the reconstruction period?
    15·2 answers
  • When the CSS property of position is set to ____ it moves the element relative to its original position and allows other element
    10·1 answer
  • During his last performance review, Franco's boss urged him to set some short-term and long-term sales goals to help him perform
    6·2 answers
  • The editing of digital photos us about the same level of difficulty as editing an analog photo
    12·1 answer
  • MULTIPLE COICE! BRAINLIEST
    12·1 answer
  • In order to personalize your desktop, you may click on: Start>settings>Personalization . . .
    9·1 answer
  • A trace table is used for
    5·2 answers
  • To verify a Windows system meets the minimum processor and memory requirements to install software, use the ________.
    8·1 answer
  • Write a program to calculate sum of first ten natural numbers​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!