1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
4 years ago
8

When formatting documents, ____ settings determine where text begins on a line in relation to the left margin?

Computers and Technology
1 answer:
Setler79 [48]4 years ago
3 0
<span>When attempting to format a given document for certain reasons, the marginal settings are the component that determine where the text will begin on the given line, and where it will be located in relation to the margins of the page, which allows creators to alter their documents to their needs.</span>
You might be interested in
Guys help me, to get 25 examples of computer software​
Alexus [3.1K]

Answer:

System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, GNU/Linux , Android and Microsoft Windows, computational science software, game engines, industrial automation, and software as a service applications.

here is the answer, well i'm really srry but I didn't put the 25 examples of computer software because i didn't do 25 but I hope I help :)

7 0
3 years ago
What are the two types of commennts of java​
hjlf

Answer:

Do you mean components??

Explanation:

If yes then then,

The components are

1. The java Virtual machine.

2.The java application programming interface

6 0
3 years ago
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
In what Career Cluster you get to design, build, and destroy things
vaieri [72.5K]

Answer: Architecture

Explanation:

A career cluster can be defined as the group of careers in which professionals are related to common features or occupational tasks are related based on the common features. One person in a career cluster may like more than one job profiles in the same career cluster.

In architecture a person may like to design, build and destroy things to redesign them again. This involves knowledge, skills, mental and physical labor. Building and road constructions are the tasks performed by the architectures.

7 0
3 years ago
The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on
slamgirl [31]

Answer:

Check the explanation

Explanation:

Draw the data model that can be seen in the two attached images below USING Crow’s Foot notation.

4 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Which of the following might be a problem taken on by environment engineers?
    8·1 answer
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • What is the first thing you should do before constructing a window in the IDE?
    14·1 answer
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    15·2 answers
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • I don't understand how to write code for this in Java using nested for loops only. The official question is: write a program tha
    8·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • 1. Multiple Choice(25 points) 1) 4’b1001 represents the following decimal number______________ a) 8 b) 9 c) 10 d) 11 2) The foll
    10·1 answer
  • Mr. Ray is looking for a platform to launch his product. His marketing team advises him to launch the product via as it is free
    15·2 answers
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!