1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
4 years ago
8

The icons to insert footnotes and endnotes in a document are located in the _____ tab.

Computers and Technology
1 answer:
ad-work [718]4 years ago
4 0

Answer:

Answer: Reference

Explanation:

You might be interested in
How to engage more underrepresented and under resourced students in stem programs?
Nady [450]

Answer:

Through after school programs

Explanation:

Under represented and under resourced students can be better engaged in STEM programs through the establishment of after school state of the arts learning centres that can augment for the vacuum in the regular school system.

In such programs, the use of technological platforms with an integrated electronic learning system is necessary, because it avails the students the opportunity to brace up with the evolving impact of information technology to learning and personal developments.

Secondly, the use of immediate resources within the reach of these under privileged and under resourced students is a necessity. for example, a student in a rural community could start become more engage in engineering designs, building technology, instrumentation and architecture through the use of disposed cartons used to construct buildings, cars etc.

8 0
3 years ago
PHP is based on C rather than ______.
Maksim231197 [3]

Answer:

2b2t

Explanation:

2b2t

8 0
3 years ago
Is backing up computer files done on the hard drive?
melomori [17]
Yes I believe so 

It should be acked up on the hard drive
7 0
3 years ago
An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte
Mama L [17]

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

8 0
3 years ago
How do you create a logo on Adobe illustrator
artcher [175]
Idk idk idk idk if dub
7 0
3 years ago
Other questions:
  • What has prompted schools to add Internet activities in their academic integrity policies?
    11·2 answers
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • Need 2.5 Code Practice Answers
    14·2 answers
  • It chapter 2 pennywise
    13·1 answer
  • 1 Point
    14·1 answer
  • A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potentia
    11·1 answer
  • Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the lette
    9·1 answer
  • You are going to buy a computer, but first you want to do some research to help you select the best model for your need. Where s
    12·2 answers
  • What makes a source credible?
    9·2 answers
  • What do you mean by Graphics editing​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!