1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
3 years ago
6

A placeholder for information that will be placed in a document is a _____.A. wizard B. merge field C. merge or D.hyperlink. The

shortcut key combination to insert an endnote is _____. Document templates are available online. T/F.
Computers and Technology
2 answers:
Svetlanka [38]3 years ago
8 0

Answer:

merge field

Explanation:

merge field- a placeholder for information from a data source that will be inserted into a document

geniusboy [140]3 years ago
4 0

Merge Fields

Merge fields are fields that contain placeholders where you can put email templates such as addresses and greetings. In addition to email templates, you can put mail merge templates and custom links. For instance, a user can place a merge field in an email template so that the salutation or the greeting includes the recipient's name rather than a simple "Hi" or "Hello".

ALT + CTRL + D

From time to time, you may find it important to insert endnotes in your Word document. By default, endnotes appear at the end of the document and a number on endnotes matches up with a reference mark. To insert an endnote, you can click the reference tab or hit the combination keys ALT + CTRL + D

Yes

There are many ready-to-use Microsoft Document Templates available online that can help you jump start your project. If you are searching for a particular layout or style template and you cannot find it, you do not have to create one from scratch. You can search for thousands of templates in the Microsoft Office Online site

You might be interested in
@anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
Readme [11.4K]
No problem I suppose...
7 0
3 years ago
Read 2 more answers
ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
ratelena [41]

Answer:

The Local, Remote and Upstream repository can each have multiple push /pull requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a pull request.

Explanation:

These are simple blanks which are answer here

The Local, Remote and Upstream <u>repository</u> can each have multiple <u>push /pull</u> requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a <u>pull request</u>.

8 0
3 years ago
When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of compute
inessss [21]

Answer:

embedded computer

Explanation:

Based on the information provided within the question it can be said that the computer that determines this is called an embedded computer. This is a microprocessor-based system that is uniquely designed in order to perform a single specific task. Once it does so, it saves the information and can be used in a much larger system such as a car dashboard system.

4 0
3 years ago
The Windows taskbar is generally found _____. at the top of the screen in the Start menu at the bottom of the screen at the righ
rjkz [21]
At the bottom of the screen.
4 0
3 years ago
Read 2 more answers
Write a program that prompts the user to enter two characters and display the corresponding major and year status. The first cha
nydimaria [60]

Answer:

  1. import java.util.Scanner;  
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        System.out.print("Please enter two characters: ");
  6.        String inputStr = input.nextLine();
  7.        if(inputStr.charAt(0) == 'B' || inputStr.charAt(0) == 'b'){
  8.            System.out.println("Biology");
  9.        }
  10.        else if(inputStr.charAt(0) == 'C' || inputStr.charAt(0)== 'c'){
  11.            System.out.println("Computer Science");
  12.        }
  13.        else if(inputStr.charAt(0) == 'I' || inputStr.charAt(0) == 'i')
  14.        {
  15.            System.out.println("Information Technology and Systems");
  16.        }
  17.        else{
  18.            System.out.println("Invalid major");
  19.        }
  20.        int num = Character.getNumericValue(inputStr.charAt(1));
  21.        if(num >= 1 && num <= 4){
  22.            switch (num){
  23.                case 1:
  24.                    System.out.println("freshman");
  25.                    break;
  26.                case 2:
  27.                    System.out.println("sophomore");
  28.                    break;
  29.                case 3:
  30.                    System.out.println("junior");
  31.                    break;
  32.                case 4:
  33.                    System.out.println("senior");
  34.                    break;
  35.            }
  36.        }
  37.        else{
  38.            System.out.println("Invalid year status");
  39.        }
  40.    }
  41. }

Explanation:

The code consists of two main parts. The part 1 is to validate the input major and print out the major according to the input character (Line 10 -22). If the input character is not matched with the target letters, a message invalid major will be displayed.

The part 2 is to validate the year status to make sure it only fall within the range of 1-4  (Line 26 -45). If within the range, the program will display the year major accordingly. If not a message invalid year status will be displayed.

4 0
3 years ago
Other questions:
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • How are different types of cars similar and different?
    10·1 answer
  • Reasons for the growth of decision-making systems include:
    13·1 answer
  • Which of the following is not an element of the modified block style?
    7·2 answers
  • In 2d design, form makes what possible?
    15·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • Who addicted to fnaf
    5·2 answers
  • At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
    5·1 answer
  • 5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!