1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
4 years ago
8

The icons to insert footnotes and endnotes in a document are located in the _____ tab.

Computers and Technology
1 answer:
ad-work [718]4 years ago
4 0

Answer:

Answer: Reference

Explanation:

You might be interested in
List the five parts of a system.describe them.
dem82 [27]
The five main parts of a system are: 

1. The CPU
The CPU is the brain of the computer. It is the main part that does all th thinking and processing.

2. RAM
which stands for Random Access Memory. As implied in its name, it can be accessed at random times by the CPU. When you open a program, all the scripts and codes that are running need to be run of a separate memory bank. Thus, the RAM takes part.

3. Drives
Hard Drives, SSDs, USB Drives, and SD cards are all forms of main computer memory. That is where the computer stores the OS, your files, and its instructions.

4. Inputs/Outputs
By inputs and outputs i mean hardware, like Speakers (ouput), Monitors (output), Keyboard (input), and Mouse (input).

5. OS
The OS is the Operating System (e.g. Windows, Linux, Mac), which is the main instructions for the computer. It is what makes your computer usable.
3 0
3 years ago
How to get amount after a percentage increase in excel​
Tresset [83]

Answer:

First: work out the difference (increase) between the two numbers you are comparing.

Increase = New Number - Original Number.

Then: divide the increase by the original number and multiply the answer by 100.

% increase = Increase ÷ Original Number × 100.

Explanation:

3 0
2 years ago
Read 2 more answers
Coding with Loops Worksheet
BartSMP [9]

Answer:

if you give me brainliest i will answer your question

Explan

4 0
3 years ago
Read 2 more answers
The function ________ comprises one or more statements that are executed when the function is called.
spin [16.1K]

Answer:

Option B(Body) is the correct answer for the above question.

Explanation:

The function is a defined processor of some specific task, which is used to perform some action of the task. The function is of two types one is predefined, which is defined by the compiler and, the other is user-defined, which is defined by the programmer. Any user-defined function has three parts--

  • Function prototype: It states the type of function.
  • Function body: It holds the collection of instruction that needs to perform by the function.
  • Function call: From where the function is called.

The above question asked about the term, which holds the statement of the function and that term is function Body, which is defined above. So the answer body, which is stated from the option 'B'. Hence 'B', is the correct option while the other is not because--

  • Option 'A' states about the header, which is not the part of the function
  • Option 'C' states about data type, which defines the types of data.
  • Option 'D' states none of these, but the answer is option B.
  • Option 'E' states about the definition, which is not the correct answer.
5 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Other questions:
  • LDAP is an industry standard employed by Microsoft, which enables IT departments to use a(n) __________ structure when creating
    7·1 answer
  • 1. Rice paste changes from white to blue black colour when a few drops of iodine solution are added to it. It shows the presence
    8·1 answer
  • Which examples demonstrate common Network Systems workplaces and employers? Check all that apply.
    13·2 answers
  • A ______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
    12·2 answers
  • Caitlyn's Crafty Creations computes a retail price for each product as the cost of materials plus $14 multiplied by the number o
    10·1 answer
  • Who wont me???????????????
    6·2 answers
  • State the domain and range for the following relation. Then determine whether the relation represents a function. A box labeled
    6·1 answer
  • When you hear music, read a printout, or view a video, you are using a computer's
    13·1 answer
  • If you are going to build a custom fast PC for gaming and you need a lot of storage for big video files and videos, but you have
    11·1 answer
  • Which tool might be useful if you want to design a scratch game for preschoolers that avoids asking them to read instructions
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!