1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
7

Explain how to number text in a document​

Computers and Technology
2 answers:
uranmaximum [27]3 years ago
8 0

Answer:

Lol

Explanation:

Yes iri

sergij07 [2.7K]3 years ago
7 0

Answer: Just start typing

Explanation: Click anywhere and start typing

You might be interested in
Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca
sineoko [7]

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

7 0
2 years ago
Drag each label to the correct location on the image List the do’s and don’ts of safeguarding your password.
Rus_ich [418]

Answer:

well a would be Don'ts

b would be Don'ts

c would be Don'ts

D Don'ts?

e Do's

hope this helps.

Explanation:

6 0
3 years ago
If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file ca
mestny [16]

If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file called a(n)  stored procedure.

<h3>What is meant by stored procedure?</h3>

An application that uses a relational database management system can access a subroutine known as a stored procedure. These processes are kept in the data dictionary of the database. Access control and data validation are two applications for stored processes.

A stored procedure is a collection of SQL statements that have been given a name and are kept together in a relational database management system (RDBMS) so they may be used and shared by various programs.

If you expect to run a certain query frequently, putting it in a special file known as a(n) stored procedure can enhance overall speed.

To learn more about stored procedure refer to:

brainly.com/question/13692678

#SPJ4

3 0
1 year ago
Which of the following is an advantage of using variables?
GaryK [48]

Answer:

D. It makes it less likely that an error will be introduced into the code.

Explanation:

7 0
3 years ago
True or False: To create a function in python, you start with the keyword "def"
Butoxors [25]

Answer:

true i think

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Survey Q, Non-scoring: What role are you playing in your team?
    5·2 answers
  • Write a program that asks for the weight of a package and the distance it is to be shipped. This information should be passed to
    12·1 answer
  • Why 3 phase motors so effective?
    5·1 answer
  • which of the following is another term for a variable, such as cost or schedule, that limits the freedom of design, development,
    11·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • Ways to be your best digital self?
    7·1 answer
  • Where would you go to access frequently used icons?
    12·2 answers
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • Identify and explain 4 traditional (old ways) marketing approaches used by University uses in reaching
    7·1 answer
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!