1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
4 years ago
14

What happens when you press the Enter key at the end of a line of bulleted text?

Computers and Technology
2 answers:
Rashid [163]4 years ago
8 0
2 and 4 if you are using word document and Google doc formats.
sladkih [1.3K]4 years ago
6 0

i think the  answer is d

You might be interested in
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
Which is the right answer
Maksim231197 [3]

Answer:

B

Explanation:

I think.

5 0
3 years ago
Read 2 more answers
Which of the following data structures can erase from its beginning or its end in O(1) time?
jekas [21]

Where all "the following" i can help you but you said which of the folllowing and ther no picture or anything?

3 0
3 years ago
Question # 4 Dropdown Finish the code for this function. ​
DaniilM [7]

Answer:

==

Explanation:

I did it on edge 2021

8 0
3 years ago
Read 2 more answers
Linda is the owner of Souvenirstop, a chain of souvenir shops. One of the shops is located at the City Centre Mall. Though the s
Klio2033 [76]

Answer:

attraction and attention

6 0
3 years ago
Other questions:
  • Consider the following JavaScript program:
    8·1 answer
  • it is important to include the __ attribute of the tag because some people use text-only web browsers
    5·2 answers
  • Can someone text me cuss I'm bored my number is (225) 975 7120
    10·1 answer
  • With a(n) ____ the editor, compiler, and executer are combined in the same application.
    7·1 answer
  • Which network component allows computers to communicate on a network without being connected directly to each other?
    9·1 answer
  • What is the name of google's mobile operating system, used on smartphones and tablets from many manufacturers?
    6·1 answer
  • Systems thinking includes consideration of all of the following EXCEPT
    9·1 answer
  • Tax preparation software can help prepare and file your taxes by _________.
    7·1 answer
  • Chloe is not pleased with how four images that she has placed on a web page relate to each other. Which search string will be mo
    5·1 answer
  • which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!