1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
14

Use the drop-down menus to complete the statements about creating a table of contents in Word 2016.

Computers and Technology
1 answer:
siniylev [52]3 years ago
6 0

Answer:

1.headings and subheadings

2.manually

3.options

You might be interested in
What does lurch mean
o-na [289]

Answer:

lurch means make an abrupt, unsteady, uncontrolled movement or series of movements; stagger.

7 0
3 years ago
Read 2 more answers
If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
umka21 [38]
64 bit the likely hood of it failing is much less
4 0
3 years ago
What kind of resources can we share over the network? Plzzzzzzzz help!!!!!!
lubasha [3.4K]

Sharing network resources requires abiding by certain constraints, as follows:

<span>Security: Organizations present ongoing opportunities for unauthorized shared resources. Security mechanisms should be implemented to provide efficient parameters.Compatibility: Various client-server operating systems may be installed, but the client must have a compatible OS or application to access shared resources. Otherwise, the client may encounter issues that create communication delays and requires troubleshooting.Mapping: Any shared OS hardware drive, file or resource may be accessed via mapping, which requires a shared destination address and naming conventions.<span>File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared resources because the Internet is FTP’s backbone. File sharing is an LAN concept.</span></span>
3 0
3 years ago
Read 2 more answers
Help me out on question 29 and 30 please
Elanso [62]

Answer:

It 5

Explain

number 28 is A and number 29 is 5

5 0
3 years ago
Select ALL of the statements that are true:
Sati [7]

Answer:

a. Datums can be established through trigonometric leveling.

d. Geoid models have improved through time.

e. NGVD29 was matched to more tidal stations than NAVD88

Explanation:

a. Datums can be established leveling with trigonometric form, is a method to determinate different elevations.

d. Geoid models have been improved through time in the gravimetric geoid model and increase accuracy, actually, these models keep refining, there were errors ins this models, nowadays are more accurate.

e. NGVD29 was matched by tidal stations more than NAVD88.

NGVD29 was established by 26 tidal gauges in United Stated and Canada, maps were prepared, but NGVD29 was replaced because is less accurate than NAVD88.

NAVD88 were not used Additional tidal.

False sentence

b. The average sea level doesn't correspond to our current vertical data, this depends on our location.

For example

Rinconada in Peru is the highest human establishment in the world to 5100 m.

Everest is the highest summit in the world to 8848 m.

This marker indicating the sea level is located in Jerusalem.

c. Often is used levels, but there are other methods like set-up, bench mark.

f. the Dynamic heights are not the same as orthometric heights, because the dynamic heights are perfect, but the orthometric heights can change slightly, in a few words are imperfect heights.

6 0
3 years ago
Other questions:
  • Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
    11·1 answer
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • If there are no differences between the amino acid sequences in the cytochrome c protein of humans and chimpanzees why aren't we
    15·1 answer
  • When naming a file you should use the _____________ instead of a space in a filename.
    6·1 answer
  • A _____ captures the pattern in a _____ and sends it to the computer, where special software translates the _____ into meaningfu
    8·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • Which term refers to the blank areas surrounding a document page? *
    15·1 answer
  • The process of identifying and eliminating bugs in a software program is most generally called
    5·1 answer
  • Why is my speedtest is very good but chrome is slow
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!