1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
12

The _____ feature will allow users to view nonprinting formatting marks to aid in editing a document. View Alignment Show/Hide I

nsert
Computers and Technology
1 answer:
Annette [7]3 years ago
5 0

The __Show/Hide Insert___ feature will allow users to view non printing formatting marks to aid in editing a document.

The answer is D. Show/Hide Insert

Let me know if this is correct

You might be interested in
What is the simplest way to permanently get rid of an unwanted file? A. Go to the Start menu and then delete the file. B. Erase
vazorg [7]

C. Send it to the recycle bin and empty the recycle bin
7 0
3 years ago
A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
MissTica

The available options are:

Understand the customer journey

Identify customer requirements based on their behavior and interactions

Provide a steady stream of marketing-qualified leads to the sales team

Help curate the right kind of content for customers

Provide feedback to the operations team regarding product quality

Answer:

Identify customer requirements based on their behavior and interactions

Explanation:

The component that includes aspects of the customer's interaction with an enterprise platform is "Identify customer requirements based on their behavior and interactions."

The above statement is true because when a customer uses an app to order pizza for delivery, the app can identify the customer's requirements based on the interaction between the customer and the app.

The customer uses the app to ask for what he wants, which is the requirements based on his behavior; the app identifies these wants and acts accordingly. This also shows interactions between the app and the customer.

8 0
3 years ago
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
Why cant i get group texts via message after deleting them on my samsung galaxy
DedPeter [7]

Answer:

I DONT KNOW               ??????????????????????????????????/

Explanation:

5 0
2 years ago
I Need Help with 6.1.3 circles in squares in codehs
ycow [4]

The program below is able to calculate the area of a circle inscribed in a Square.

<h3>What is a program?</h3>

A program is a set of instructions given to the computer with specific end results in mind.

<u>Sample program in Java

</u>// Java Program to find the area of

// an inscribed circle in a square.

import java.io.*;

class GFG {

   

   static double PI = 3.14;

   

   // Function to find area of an

   // inscribed circle in a square.

   static double areaOfInscribedCircle(float a)

   {

       return ( PI / 4 ) * a * a;

   }

   // Driver code

   public static void main (String[] args)

   {

       float a = 8;

   

       System.out.println("Area of an inscribed"

       + " circle: " + areaOfInscribedCircle(a));

   }

}

Learn more about programs at :
brainly.com/question/1538272
#SPJ1

5 0
2 years ago
Other questions:
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • In a block-style business letter, the paragraphs are double-spaced and indented. <br> True or False
    15·2 answers
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • In order for the wavelength of a wave to increase, the frequency must...
    10·1 answer
  • Which network component is used to connect one network to another? Which component delivers the message to the destination compu
    5·1 answer
  • Speeding is one of the most prevalent factors contributing to traffic crashes.
    12·1 answer
  • Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
    15·1 answer
  • . Which responsibility belongs to the marketing function?
    11·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!