1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
4 years ago
9

Use the drop-down menus to complete the statements about using section breaks in a document

Computers and Technology
1 answer:
krok68 [10]4 years ago
7 0

Answer:

layout, next page, continuous

Explanation:

just took it

You might be interested in
What is the best explanation for why digital data is represented in computers in binary?
Thepotemich [5.8K]

Answer: (B)  It's easier, cheaper, and more reliable to build machines and devices that only have to distinguish between binary states.

Explanation:

 The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.  

Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.

The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.

3 0
3 years ago
What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical
Inessa [10]

Answer:

Corrective Control

Explanation:

Physical Control are devices that limit access or otherwise protect a resource, such as fences, doors, locks and fire extinguishers.

Technical Control are devices or processes that limit access to resources. Examples include user authentication, antivirus software, and firewalls. Technical controls are also called <em>Logical Control</em>

Corrective Control repair the effects of damage from an attack.  Corrective contol include: include virus removal procedures, firewall table updates, and user authorisation database updates.

8 0
4 years ago
When users talk about font size,
koban [17]

Answer:

The answer is 10......

4 0
3 years ago
Read 2 more answers
Which one of these is a mem?
sweet [91]
If you are referring to a meme then the answer would be B. This is because memes are pictures that spread throughout the internet. The answer choice A would be a username. I was not able to find anything on the word mem that relates to computers but I did learn that it is the 13th letter of the Hebrew alphabet.
8 0
3 years ago
QUICK HELP ME PLEASE
Sholpan [36]

Answer: Cable Internet access requires the setting up of fiber cables. It is the fastest type of Internet access technology. that's the answer

4 0
3 years ago
Other questions:
  • What is one reason the SOC categorizes occupations as it does?
    9·1 answer
  • Choose the appropriate of an image that supports the text. You should also make sure that the image is
    12·2 answers
  • Do clocks have cell's?
    15·2 answers
  • Which feature of Microsoft power point make tiles fly in on the clock of a mouse
    8·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I<br>please help need the correct answers to all
    6·1 answer
  • What are the four requirements of a linear programming​ problem?
    8·1 answer
  • 2.cite at least 2 example on how multimedia facilitates learning​
    6·1 answer
  • If a person's mobile phone was designed to work with 4G technology, what will happen when a 5G network is rolled out in their ar
    14·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!