1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
8

Before inserting a preformatted table of contents, what must you do first?

Computers and Technology
1 answer:
vova2212 [387]3 years ago
6 0

Answer: apply heading styles to text.

Explanation:

You might be interested in
A spreadsheet program is a computerized version of
MrRa [10]

Answer:

A spreadsheet program is a computerized version of paper accounting.

Explanation:

A spreadsheet program is a computerized version of a paper accounting worksheet where everyone can easily use the sheet according to their need. For example, a spreadsheet can be used as a data entry sheet, as arithmetic operations. Data entry in paper accounting was done manually with paper whereas spreadsheet has cells in it to record the entries. Similarly, other operations such as recording the data, performing analytical operations were part of old system and these are now used in spreadsheet as a basic function.  In short, the spreadsheet is a very friendly application where values can be analyzed, stored, and modified as per requirements. These all defined tasks are part of paper based accounting now done using computer program.

7 0
3 years ago
Read 2 more answers
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records
Jet001 [13]
The answer to your question is answer A
3 0
3 years ago
Does anyone know about the progressive era?
Umnica [9.8K]

Answer: The Progressive Era was a period of widespread social activism and political reform across the United States that spanned the 1890s to the 1920s.

Explanation:

8 0
3 years ago
Read 2 more answers
What does a "swivel chair" work task involve?
nadezda [96]

Answer:

An employee literally swings from application to application to accomplish the laborious task of manually copying information from one application, validating it, and pasting it in another application. In applying human judgment and decision making: Entering data multiple times into different applications. Ensure that complex information obtained from an application is accurate. Communicate physicallly with a group of people simultaneously.

Explanation:

4 0
2 years ago
Other questions:
  • (011001111)2=(?)10 can anyone solve this urgent <br><br> Hurry
    11·2 answers
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and dis
    13·1 answer
  • : How does the founder of Wikipedia keep a tight reign on accuracy? HELP PLEZ AT LEAST A PARGRAPH PLES
    6·1 answer
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • What is sun and what does it do?
    12·2 answers
  • Implication of technological literacy to a teacher training today
    13·1 answer
  • This is a program that calculates information about orders of shirts and pants. All orders have a quantity and a color. Write a
    7·1 answer
  • Which printer are used to print text and graphics with high speed ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!