1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
9

Describing Report Tools Functions

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
4 0

Answer:

C. format

Explanation:

You might be interested in
Negative methods of behavior correction include all but this:
Zanzabum

When you desire to modify someone else’s behavior, you need to ensure that the approach you use is effective for your target. Though positive punishments, which are done through negative methods such as giving a sarcastic response, verbally abusing, or humiliating the target for exhibiting the behavior can be used, it may not be as effective as (C) setting an example for proper behavior.

8 0
4 years ago
You can run a macro by:
oee [108]

Selecting the button assigned

Using the shortcut Keys assigned

Explanation:

By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.

So, the two options we can use to run a macro.

7 0
3 years ago
5. The operating system has two components
Alexxandr [17]

Answer:

(D) is the correct answer for this question.

3 0
3 years ago
Read 2 more answers
Sam wants to use the rule of thirds to capture the essence of his image. How will he apply this rule in his image to get a pleas
Nookie1986 [14]

Answer:

The correct answer is A.

Explanation:

Remember that the rule of thirds involves mentally dividing the image into 3 equal parts; This is done to focus the points of interest of the image.

The rule of thirds helps you identify the points of greatest interest in the image or center of attention (also called framing).

I took into account that in the rule of thirds three elements:

•    Point of attention (the protagonist of the photo).

•    Focus

•    Balance.

5 0
3 years ago
Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
solong [7]

Answer:

The following network level session hijacking attack shown by Sean is Blind Hijacking, LETTER C.

Explanation:

<em>Because he is injecting malicious data or commands into the intercepted communications in the TCP session even if the source-routing is disabled. He can send the data or commands but hass no access to see the response.</em>

3 0
4 years ago
Other questions:
  • Provide the code to insert a subtitle track named "Spanish Version" using the track text in the spanish.vtt file and the Spanish
    9·1 answer
  • Which of the following represents the bus topology? Multiple Choice All devices are connected to a central device, called a hub.
    8·1 answer
  • The basic components of cartridges and shotshells are similar. Shot pellets and a bullet are examples of which basic component?
    13·1 answer
  • Describe, step by step, how to create an account for a computer on the domain controller.
    11·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • Discuss at least two challenges students face when conducting research on the Internet.
    7·2 answers
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • Which structure does a web page normally use to define an area of focus <br>​
    9·1 answer
  • What does a virtual machine emulate?
    14·1 answer
  • How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them k
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!