1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
4 years ago
15

What are three options available on the Line and Page Breaks tab in microsoft word 2010?

Computers and Technology
2 answers:
lyudmila [28]4 years ago
6 0
Sorry but I don’t know.
ExtremeBDS [4]4 years ago
4 0
Select the paragraph that you want to follow the page break.
On the Home tab in Word, or on the FORMAT TEXT tab in an Outlook email, click the Paragraph Dialog Box launcher.
Click the Line and Page Breaks tab.
Under Pagination, select the Page break before check box.


P.S. I don’t know this so I searched it up and got that answer up
You might be interested in
Which best explains the process he would follow?
nikitadnepr [17]
I think the answer is c. I just did that edginunity
7 0
4 years ago
Which account type is require to join the computer to the domain?
yulyashka [42]

Answer:

the computer must have an account in the domain which, like a user account, includes a logon name (sAMAccountName), a password, and a security identifier (SID) that uniquely represent the computer as a security principal in the domain.

Explanation:

-Hailey:

4 0
3 years ago
The ____________ is an interest inventory that classifies people according to six different types: Realistic, Investigative, Art
Kamila [148]
1) C) Campbell Interest Inventory.

Also known as the Strong Interest Inventory, this was developed based on the Holland Codes (6 traits listed in the question), it was developed by psychiatrist Edward Strong and later revised by David Campbell. 

2) C) FOCUS2

The FOCUS2 test is a test that matches students with study programs based on their assessed aptitudes and interests. <span />
7 0
4 years ago
Read 2 more answers
Write a method called listUpper() that takes in a list of strings, and returns a list of the same length containing the same str
pav-90 [236]

Answer:

//method listUpper takes a list of strings as parameter

public List<String> listUpper(List<String> list)

{ List<String> finalList= new ArrayList<String>();

//finalList is created which is a list to display the strings in upper case

for(String s:list){ //loop iterates through every string in the list and converts each string to Upper case using toUpperCase() method

s = s.toUpperCase();

finalList.add(s); } //finally the upper case strings are added to the finalList

return finalList; } //return the final list with uppercase strings

Explanation:

The method listUpper() works as follows:

For example we have a list of following strings: ("a", "an", "being").

finalList is a list created which will contains the above strings after converting them to uppercase letters.

For loop moves through each string in the list with these strings ("a", "an", "being"). At each iteration it converts each string in the list to uppercase using toUpperCase() and then add the string after converting to uppercase form to the finalList using add() method. So at first iteration "a" is converted to A and added to finalList, then "an" is converted to uppercase AN and added to finalList and at last iteration "being" is converted to BEING and added to finalList. At the end return statement returns the finalList which now contains all the string from list in uppercase form.

3 0
3 years ago
Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​
goldenfox [79]

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

3 0
3 years ago
Other questions:
  • Fiber deployment architectures include all of the following except:
    7·2 answers
  • How can an installation be a tool for community building?
    9·1 answer
  • How can social media be useful for brand awareness ?
    14·1 answer
  • The registrar does all of the following except:
    12·2 answers
  • Define a public class named Sample with two instance variables: an int called count and a String called name. Provide a complete
    7·1 answer
  • PLEASE HELP!!!!!!!!!!!!!!!!!!!!
    13·1 answer
  • The Account class contains a definition for a simple bank account class with methods to withdraw, deposit, get the balance and a
    14·1 answer
  • Write measure five safety measures can be taken to stay safe in social media​
    9·2 answers
  • Fill in the blank to complete the sentence.
    8·1 answer
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!