1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
4 years ago
9

A(n) _____ is a list at the beginning of a publication that shows the main topics in a book or report and provides page numbers

to quickly access material.
Computers and Technology
2 answers:
ExtremeBDS [4]4 years ago
5 0
Index or table of contents
frez [133]4 years ago
5 0

table of contents

Just took the quiz

You might be interested in
When an object is falling because of gravity, the following formulacan be used to determine the distance the object falls in asp
ser-zykov [4K]

Answer:

True

Explanation:

When an object is falling under the influence of gravity, the distance of fall as a function of time is given by:

D(t)=ut + 1/2 * a * t^2

Where

u = initial velocity of the object ( = 0 in this case as the object is falling only under gravity),

a = acceleration of the falling object = g = 9.8 m/s^2 which represents the acceleration due to gravity.

Simplifying,

D(t) = 1/2 * g * t^2

6 0
3 years ago
7.2 code practice edhesive. I need help!!
GaryK [48]

Answer:

It already looks right so I don't know why it's not working but try it this way?

Explanation:

def ilovepython():

    for i in range(1, 4):

         print("I love Python")

ilovepython()

6 0
3 years ago
In PC relative addressing mode, the PC and constant need to be added to
vlabodo [156]

l think is the right answer is (a)

6 0
3 years ago
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Refer to the exhibit. pc1 issues an arp request because it needs to send a packet to pc3. in this scenario, what will happen nex
Sauron [17]
RT1 will send an ARP answer with its own particular Fa0/0 MAC address.When a system gadget needs to speak with a gadget on another system, it communicates an ARP ask for requesting the default portal MAC address. The default portal (RT1) unicasts an ARP answer with the Fa0/0 MAC address.
5 0
4 years ago
Other questions:
  • What is the purpose of a budget
    7·1 answer
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
    10·1 answer
  • _____ are the most fundamental components of designing a training program that determine the amount of stress placed on the body
    6·1 answer
  • How many lines of text are in your questionnaire document
    5·1 answer
  • What is a symbol such as a heavy dot or another character that precedes a text in a power point
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!