1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
6

As Robin uses her computer to write a report of her team’s investigation, she is struggling to keep the footnotes numbered in th

e correct order.?
Computers and Technology
2 answers:
Fittoniya [83]3 years ago
8 0
Okay, so I know that you haven't stated the questions nor the answer choices, but I have seen this question before. The answer is to use the word processing software to enter footnotes. 
Dafna11 [192]3 years ago
7 0

Answer:

B. Use the word processing software to enter footnotes.

Explanation:

The following options are missing in the question:

<em>A. Use a Works Cited list instead of footnotes. </em>

<em>B. Use the word processing software to enter footnotes. </em>

<em>C. Use an asterisk (*) instead of different numbers for each note. </em>

<em>D. Use endnotes instead of footnotes.</em>

Word processing software allows the user to enter footnotes and the number associated to each note is automatically generated by the software, so that, if a footnote is deleted all the other footnote's numbers are automatically updated.

You might be interested in
Excel spread sheets are primarily used to
Juli2301 [7.4K]

Answer:

work with numbers and text.

Explanation:

Spreadsheets can help organize information, such as alphabetizing a list of names or ordering records, and calculate and analyze information using mathematical formulas.

4 0
3 years ago
Read 2 more answers
Which two sentences uses the colon correctly?
faust18 [17]
You much list something after a colon.
For example
Kaylina's bag included:
Food,Books,Makeup,and a brush.
5 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
2 years ago
1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
zhuklara [117]
Q1:
1. Go into the bathroom
2. Put toothpaste on the toothbrush
3. Place head of toothbrush on your teeth
4. Revolve in small circles
5. Repeat 4 for all of your teeth
6. Use water to wash away the toothpaste in you mouth
5 0
3 years ago
Read 2 more answers
--concept mapping--
defon

Answer:

-Both need oxygen from the trees to breathe

-Without trees the population of animals and people would be dying

Explanation:

Thats all I can think of

7 0
3 years ago
Other questions:
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • What is the difference between amplifier and the repeater?
    11·1 answer
  • In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activi
    11·1 answer
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • _____ is the management function that monitors the performance of the firm and makes improvements when necessary
    15·1 answer
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
    6·1 answer
  • What is the largest place value in a 12 bit binary number?
    10·1 answer
  • Busco a talcotalco38
    14·2 answers
  • Which native windows application allows you to access basic pc settings and controls such as system information, controlling use
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!