1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
15

Default tab stops are set in word every _______ inch. a. ¼ b. ¾ c. ½ d. 1

Computers and Technology
1 answer:
UNO [17]3 years ago
5 0
Default tab stops are set in word every 1/2 inch so your correct answer is C :)
You might be interested in
Debug the recursive reverseString method, which is intended to return the input String str reversed (i.e. the same characters bu
Nady [450]

Answer:

Explanation:

The following modified code correctly uses recurssion to reverse the string that was passed as a parameter to the reverseString method. A test output using the runner class can be seen in the attached image below.

import java.util.Scanner;

class U10_L2_Activity_One {

   public static String reverseString(String str) {

       if (str.isEmpty()) {

           return str;

       }

       return reverseString(str.substring(1)) + str.charAt(0);

   }

}

class runner_U10_L2_Activity_One

{

   public static void main(String[] args)

   {

       System.out.println("Enter string:");

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println("Reversed String: " + U10_L2_Activity_One.reverseString(s));

   }

}

7 0
3 years ago
If you were any type of fnaf charater who would you be and why?
Contact [7]

Answer:

Foxy

Explanation:

Cause he's cool and he's my favorite.

3 0
3 years ago
Read 2 more answers
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
An elevator of mass 250kg is carrying two persons whose masses are 50kg and 100kg. if the force exerted by the motor is 3000N. C
Agata [3.3K]

m_{elevator}=250kg \\m_{people}=50kg+100kg=150kg \\m_{motor}\approx3000N\div10\frac{m}{s^2}\approx300kg \\m_{total}\approx250kg+150kg+300kg\approx\boxed{700kg}

Hope this helps.

r3t40

5 0
3 years ago
Will give brainliest!!!!!!!!
dolphi86 [110]

Answer:

d the overall strength of colours

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • If you think the user might enter 24.9, you should create a float variable. true or false
    9·1 answer
  • During the ________ phase of the systems development life cycle process, developers construct, install, and test the components
    13·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • What are the two ways that assets are
    5·1 answer
  • What is the output of the code snippet given below?string s = "abcde";int i = 1;while (i &lt; 5){ cout &lt;&lt; s.substr (i, 1);
    11·1 answer
  • Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the arr
    5·1 answer
  • Explain how files can be identified as entities on the magnetic surface?
    8·1 answer
  • Which field would best function as a primary key for a table that tracks orders?
    11·2 answers
  • The {blank} view is the working window of a presentation.
    15·2 answers
  • Question 1 (1 point)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!