1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
4 years ago
14

What happens when you press the Enter key at the end of a line of bulleted text?

Computers and Technology
2 answers:
Rashid [163]4 years ago
8 0
2 and 4 if you are using word document and Google doc formats.
sladkih [1.3K]4 years ago
6 0

i think the  answer is d

You might be interested in
Given input of a number, display that number of spaces followed by an asterisk. (1 point) Write your solution within the existin
Naddika [18.5K]

Answer:

Following is the program in C++ language

#include <iostream> // header file

#include <iomanip> // header file  

using namespace std; // namespace std;

void problem2() // function definition  

{

int num ; // variable declaration  

cout << "Enter the Number: ";

cin >> num; // Read the input by user

cout << "Resulatant is:";

for(int k = 0; k <num; k++) // iterarting the loop

{

std::cout << std::setw(num); // set width

std::cout <<"*"; // print *

}

}

int main() // main function

{

problem2();// function calling

return 0;

}

Output:

Enter the Number:  3

Resulatant is:    *   *   *

Explanation:

Following is the description of program

  • Create a function problem2().
  • Declared a variable "num" of "int" type .
  • Read the input in "num" by the user .
  • Iterating the for loop and set the width by using setw() and print the asterisk.
  • In the main function  calling the problem2().
7 0
4 years ago
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
emmainna [20.7K]

Answer:

The correct option is : c. 0

Explanation:

The XOR Cipher is an encryption technique which involves an operator called the xor operator. The XOR operator is denoted by (⊕).

This cryptographic technique uses key to convert the plain text into the encoded value with the help of XOR multiplication.

<u>Example: 1 + 1 = 0 </u>

This value, 0 is encrypted. It is obtained from the plain text, the provided key and the xor operator.

<u>for example:</u>

Plain message :

1011

key to encrypt  Plain message :

1001

The encrypted message is :

1⊕1=0

0⊕0=0

1⊕0=1

1⊕1=0

encrypted message is :

0010

<u>The result of adding two bits 1 and 1 in xor cipher : 1⊕1 =0</u>

4 0
4 years ago
JAVA
qwelly [4]

public class MyClass {

   public static void main(String args[]) {

     int x = 1;

     int total = 0;

     for (int i = 1; i <= 10; i++){

         x *= i;

         total += x;

     }

     System.out.println(total);

   }

}

This program finds the sum of that series to the tenth term, the sum is: 4037913. I hope this helps.

6 0
3 years ago
What is the difference between KE an PE
PtichkaEL [24]
KE is the energy possessed by an object by virtue of it being in motion. PE is the energy possessed by an object by virtue of its position. It can be transferred from one object to another and this happens during collisions. Potential Energy, on the other hand, cannot be transferred from one object to another.
3 0
3 years ago
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by alte
prisoha [69]

Answer:

Option(b) i.e "utility virus" is the correct answer to the given question

Explanation:

The utility virus sometimes affected the operating system .It created the new files in the computer that makes the computer system slow .The utility virus making the spreading of malware in the computer system

The main objective of utility virus damaging the software program that impacts a pc or infects also it negatively by changing the way the machine operates without the user knowledge or the permission.

  • File conversion is used for converting the file extension it does not impact on computer damaging that's why this option is incorrect .
  • Hotspot is used to giving the access of internet it does not impact on computer damaging that's why this option is incorrect .
  • File compression utility  and  ZIP is used to reducing the file size it does not impact on computer damaging that's why this option is incorrect.

Therefore utility virus is the correct answer .

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following has likely attended vocational school?
    10·1 answer
  • Anyone know the answer I need help
    12·1 answer
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • What is an example of an attribute for a screen object
    14·1 answer
  • Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
    12·1 answer
  • Complete the sentence.
    8·2 answers
  • 3 uses of Microsoft word in hospital
    10·1 answer
  • Dash transfers several bits of data together at one time<br>​
    6·1 answer
  • Can somebody please help me with these few questions?
    11·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!