1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
15

Match the spacing options to their meanings.

Computers and Technology
2 answers:
emmainna [20.7K]3 years ago
4 0

Answer:

Before text -> indents paragraph to the right

First line -> indents the start of a paragraph

Register-true -> formats page styles

Line spacing -> manages space between two lines

Explanation:

Line spacing is the space between each line in a paragraph  

The REGISTER-TRUE feature makes lines consistent across the pages  

Indentation can be done to only the first line or to the whole paragraph

Maslowich3 years ago
3 0

Before text = indents paragraph to the right  

First line = indents the start of a paragraph

Register-true = formats page styles  

Line spacing = manages space between two lines  

The first line always gets indent to specify that it is a start of the paragraph

Line spacing always focus on the number of spaces between lines. There are various values available to give spacing according to the need. Register- true is used to format all the page styles and do other related configurations.

You might be interested in
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
How do you find binary?
trasher [3.6K]

Answer:

To convert integer to binary, start with the integer in question and divide it by 2 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero. Then just write out the remainders in the reverse order.

Explanation:

3 0
2 years ago
2. What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
Pachacha [2.7K]
The website may crash if it was not built to sustain a large number of viewers.
6 0
3 years ago
Read 2 more answers
The ________ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia.
Scorpion4ik [409]

Answer:

The answer is hippocampus.

Explanation:

The ___hippocampus._____ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia. The __hippocampus.______ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia.

4 0
2 years ago
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
3 years ago
Other questions:
  • What is the best web browser to use?
    9·2 answers
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • I love dog my is 16 weeks old how old is yours
    12·1 answer
  • What does this result prove about the computer’s network connectivity?
    12·1 answer
  • Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
    15·1 answer
  • Why are free web based providers so popular?
    12·1 answer
  • S.B. manages the website for the student union at Bridger College in Bozeman, Montana. The student union provides daily activiti
    7·1 answer
  • QUESTION 4 of 10: True or False: According to the reading, investors care about your love for your business.
    5·2 answers
  • Which option is typically only used when utilizing self joins?
    8·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!