1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
15

The Tab dialog box helps you set tabs in your word processing document. What does this dialog box control the movement of when y

ou press the tab key?
Margin
Header
Footer
Cursor
Computers and Technology
1 answer:
Anika [276]3 years ago
3 0
Margin Margin Margin Margin
You might be interested in
which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
AysviL [449]

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

5 0
3 years ago
Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
xenn [34]
All devices on your network segment.
4 0
3 years ago
DRU is a small brokerage house that enables its clients to buy and sell
Rudik [331]

The complete question rather reads;

DRU is a small brokerage house that enables its clients to buy and sell

stocks over the Internet, as well as place traditional orders by phone or Fax. DRU has just decided to install a new e-mail package. One vendor offering an SMTP-based two-tier client-server architecture. The second vendor is offering a Web-based e-mail architecture. DRU doesn't understand either one but thanks the Web-based one should be better because, in their words, "the Web is the future".

<u>(a) Briefly explain to DRU management, in layperson's terms, the difference between the two.</u>

<u>(b) Outline the pros and cons of the two alternatives and </u>

<u>(c) Recommend to DRU about which is better</u>

<u>Explanation:</u>

a) SMTP stands for Simple Mail Transfer Protocol. Thus, put simply an SMTP-based two-tier client-server architecture is a package that involves using a client-server provider like Outlook. This implies that Outlook provides the client with his own unique PO Box (server) so to speak.

While the Web-based e-mail architecture enables the DRU access to online mail platforms like G-mail with little server customisation features.

b. The Web-based e-mail architecture is good for personal email activities because of its ease of operation, however, it does not provide top security and customisation features. While an SMTP-based two-tier client-server architecture allows for unique server customisation with added security features as well be suitable for larger organisational work. Although a disadvantage is that it may cost more and quite a complex process to learn.

c) Since DRU is a growing firm the SMTP-based two-tier client-server architecture would be recommended as this would provide it will efficient customer service delivery.

6 0
3 years ago
I.C.T
oee [108]

Soft and hard copies in my opinion

8 0
3 years ago
Read 2 more answers
Assume that ip1, ip2, and ip3 have already been declared to be of type "pointer to int". Assume further that each of these point
kaheart [24]

Answer:

void main(){

int *ip1,*ip2,*ip3;

printf("Enter values for ip1 and ip2\n");

scanf("%d\n",ip1);

scanf("%d\n",ip2);

*ip3=*ip1+*ip2;

}

Explanation:

*ip3=*ip1+*ip2;

this statement is used to add the values of two pointer variables and storing it in third pointer variable.

*ip1 --->ip1 gives address location of the variable and *ip1 gives the value stored at that address location

5 0
3 years ago
Other questions:
  • Enables you to navigate through pieces of information by using links which connect them.
    10·1 answer
  • What does the word “Gacha” come from??????
    5·2 answers
  • Who could be involved in the murder of Mr Douglas​
    6·2 answers
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • What is program used to detect and eliminate any viruses or worms trying to infect your computer
    15·1 answer
  • What are three ways to protect yourself from identity theft when using your smartphone or computer?.
    15·1 answer
  • Computer are most wonderful creation of 21st century how ?​
    15·1 answer
  • How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
    6·1 answer
  • In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!