1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
3 years ago
7

Explain how to number text in a document​

Computers and Technology
2 answers:
uranmaximum [27]3 years ago
8 0

Answer:

Lol

Explanation:

Yes iri

sergij07 [2.7K]3 years ago
7 0

Answer: Just start typing

Explanation: Click anywhere and start typing

You might be interested in
Where are some places that cyberbullying occurs? check all that apply
antiseptic1488 [7]

Answer:

social media like  snap chat twitter  and face book .it can even happen over email.or in school chats.

Explanation:

5 0
4 years ago
Read 2 more answers
Which statement is true of arrays? A) Array elements cannot be reset after the array is declared. B) Only whole numbers can be s
vekshin1

Answer:  Option (D) is correct

Explanation:

Array subscripts are used for refereeing to a individual element in the array.It is created by subscript operator for naming it.It can define the value about location often element. Array subscript can contain whole numbers only.

  • Other options are incorrect because array can be reset,other number along with the whole numbers can get stored in array and it can take high execution time.
  • Thus, the correct option is option(D.)
7 0
4 years ago
To which type of domain does information on wikis belong?
Misha Larkins [42]

Answer:

Hope it helps you. ^_^

Explanation:

".info (TDLs)" domain.

3 0
3 years ago
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
I need help 40 points and brainless if you answer
Reil [10]
The answer is c
But I’m not sure
8 0
3 years ago
Read 2 more answers
Other questions:
  • Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victor
    9·2 answers
  • A heuristic is applied during a search process in hopes of producing a
    5·1 answer
  • The World Wide Web is a program that allows you to search for information on the Internet.
    11·1 answer
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
    5·1 answer
  • Apollo Couriers, a company providing international express mail services, has a proactive customer communications team. The prim
    8·1 answer
  • A simulation model includes: a. a description of the components of the system. b. a simulation clock. c. a definition of the sta
    8·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • There are 2048bytes in4megabytes true or false​
    10·1 answer
  • Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!