1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
14

Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the foote

r and places her insertion point where the page numbers should go. Then, she navigates to the Header and Footer command group in the Design view.
Use the drop-down menus to explain how Angelina should complete this process.

What is her next step?

What should she do next?

What should she do last?
Computers and Technology
1 answer:
Mkey [24]3 years ago
4 0

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

Just did it, e2020

You might be interested in
I had about 83 GB before I installed Xcode, I was in the middle of the installation and reconsidered my decision but it's still
Natasha_Volkova [10]

You can try downloading some kind of computer cleaner like CleanMyMac X free version, also definitely restart your computer if you haven't done so already.

4 0
3 years ago
Read 2 more answers
The 16 broad career options developed by the US department of education are called
In-s [12.5K]
The answer is career clusters. 
6 0
3 years ago
Which option is available when reviewing changes and using the Accept command in the Compare group?
Zarrin [17]

Answer: Accept only one at a time, all on a slide, or all changes in a presentation.

Explanation:

Took the review

6 0
3 years ago
Read 2 more answers
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
Which of the following are devices that work essentially like a pen and paper, allowing the user to input drawings on a computer
DochEvi [55]
The device that work essentially like a pen and paper, allowing the user to input drawings on a computer is graphic tablet. The first option is correct.
3 0
3 years ago
Other questions:
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • Question 16 (2 points) Question 16 Unsaved
    11·1 answer
  • Sarah, a computer user, tells James, a computer technician, that the network she is connected to is running too slowly. Which of
    5·1 answer
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
    6·2 answers
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • With whom does the success of information processing in the firm lie with?
    7·2 answers
  • How can you quickly locate emails with large attachments.
    14·1 answer
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!