1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
10

David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.

Computers and Technology
1 answer:
shusha [124]3 years ago
3 0

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

You might be interested in
ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
SVETLANKA909090 [29]

Answer:

The answer to this question is 12.

Explanation:

You can enter a maximum of 12 ICD-10-CM codes on a single claim.Since we know that the codes entered in CMS-1500 claim are in the block of 21 in ICD-10-CM diagnosis.This should be kept in mind always in medical insurance.

So we conclude that the answer to this question is 12.

5 0
3 years ago
What does the Merge and Center feature do? Check all that apply.
mote1985 [20]

Answer:

Merging cells combines the selected cells to form a large cell.

Explanation:

To merge cells, select the cells you want to merge and click on Merge & Center in the ribbon. Centering just makes the values/text in the cell centered. Wrapping text means to have the text in a cell not keep going horizontally but be in "paragraph form".

8 0
3 years ago
Read 2 more answers
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Determine the value for the following recursive method when x = 19.
Vedmedyk [2.9K]

Answer:

f(19) = 2

Explanation:

Given

f(x) = f(x - 5)+ 2 --- x > 9

f(x) = -2 --- x \le 9

Required

Find f(19)

f(19) implies that: x = 19

Since 19 > 9, we make use of:

f(x) = f(x - 5)+ 2

f(19) = f(19 - 5) + 2

f(19) = f(14) + 2 ----- (1)

Calculate f(14)

f(14) implies that: x = 14

Since 14 > 9, we make use of:

f(x) = f(x - 5)+ 2

f(14) = f(14 - 5) + 2

f(14) = f(9) + 2 ------ (2)

Calculate f(9)

f(9) implies that: x = 14

Since 9 \le 9, we make use of:

f(x) = -2

f(9) = -2

So:

f(14) = f(9) + 2

f(14) = -2 + 2

f(14) = 0

f(19) = f(14) + 2

f(19) = 0 + 2

f(19) = 2

3 0
3 years ago
Which of the following had already existed in Africa before the Portuguese arrived?
Ray Of Light [21]

Answer:

D. Extensive trade networks

Explanation:

Trade in in raw materials as well as manufactured goods and other items was already established in Africa before the coming of the Europeans. There were already many trade routes by which African Kingdoms traded in diverse commodities in many renowned kingdoms of Africa before the Trans-Atlantic slave trade.

Trading was carried out on land and by waterways, these existing trade network enabled the Europeans to have access to Africa . Without these existing trade routes, the penetration of the Europeans would have been more challenging.

5 0
3 years ago
Read 2 more answers
Other questions:
  • business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
    9·1 answer
  • Describe how implementation of a raid level 2 system would be beneficial to a university payroll system
    12·1 answer
  • How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
    12·1 answer
  • Write a Python function that takes a positive integer N and returns the factorial of N, i.e., N! The factorial of N, denoted N!,
    11·1 answer
  • Help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!​
    9·1 answer
  • Help please!! worth 10 pts! answer quick please!
    12·1 answer
  • I really need help in this!!!
    11·1 answer
  • When and why would you use a prefab? <br> Subject video gaming
    8·1 answer
  • Select the three concepts of capital outlay.
    15·1 answer
  • Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!