1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
8

Place the steps in order to link and place text into the document outline, effectively creating a master document.

Computers and Technology
1 answer:
erik [133]3 years ago
8 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is asked about placing or linking text in an outline view and what would be the correct steps of placing text in an outline view.

The correct order to link and place text into the document outline, effectively creating a master document is given below:

  1. Click Outline view
  2. Click Show Document
  3. Click Insert
  4. Select the document file
  5. Click open

You might be interested in
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages
pentagon [3]

Answer:

XML (Extensible Markup Language):

Explanation:

XML (Xtensible Markup Language):

It is a markup language that is used for creating web-pages, it defines a set of rules that makes it readable both to humans and machine.

XML was primarily designed to be a software and hardware independent tool and it's focus was on data.  XML provides a framework for defining markup languages.

XML, HTML and XHTML are all related to each other because they are all markup languages and can be used to build websites.

Basically,

-HTML is primarily for web-pages.

-XML is primarily for data.

-XHTML is a standard based on HTML that follows the strict rules of XML.

6 0
3 years ago
Your mothers date of birth and a unique personal identification number (pin) code provide authentication by _____.
Semenov [28]
Hello <span>Madysonhenders2477 </span><span>

Answer: Your mothers date of birth and a unique personal identification number (pin) code provide authentication by What you are (C)

Since your identification is about who you are, this would be the answer.

Hope This Helps!
-Chris</span>
6 0
3 years ago
I know I should add Family and food by default (and I will) But I wanna hear some more from other peoples perspective
lidiya [134]

Answer:

you could say something like your friends or your pets if you have any pets you could say something like you are grateful that we now have 3 vaccines for the Coronavirus or like you are grateful for your hobbies because it gives you something to do in your free time.

Explanation:

i hope this helps.

7 0
3 years ago
Read 2 more answers
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
File names should describe what is in the file in a few words
JulijaS [17]

Answer

File names should describe the content of the file.

Explanation

File names are set of words  which are used to uniquely identify computer files which are stored in a file system. This helps one to know the contents of the file which you want to find. When you name these file names you use necessary characters you use descriptive words so that you dont have hard times when searching for them. The naming also is determined by the file system you are using because different systems impose different restrictions on the length of the file names and the allowed characters within file names.

3 0
3 years ago
Other questions:
  • True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
    13·1 answer
  • Which transformation(s) can be used to map ARST onto
    8·1 answer
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e
    5·1 answer
  • Why is weather forecast so important for hang gliders?
    12·1 answer
  • ________ are chunks of software - installed on one's computer, tablet, or smartphone - that are gateways to games, online resour
    8·1 answer
  • Anyone play Ps4 and wanna run up some warzone or Gta? Im M 16 so dont be a creep... :) ill mark brainliest if you drop gamertag
    8·2 answers
  • As data travels further over a wavelength or frequency, what goes down?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!