1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
15

Explain the difference between numbered text and outline numbered text in terms of their use.​

Computers and Technology
1 answer:
djverab [1.8K]3 years ago
4 0

Answer:

With numbered text, the last identifier also conveys how many blocks were in the list. With outline-numbered text, the items are in a well-ordered hierarchy.

I hope this might helps a little bit.

You might be interested in
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Help please<br>Who will give the answer I'll mark him/her as brainlist..​
kolbaska11 [484]

Answer:

We will be using Average function of Excel Calculation sheet.

Its Syntax in Calc sheet is : =AVERAGE (number1, [number2], ...)

or you can use =Average and then click on the first cell and drag the whole row till end and close the brackets. It will calculate the average of that row.

Once you have applied average function on first row, you can drag this cell down the column and it will replicate the same function for respective rows.

4 0
3 years ago
How can i clip a picture to a question on the computer?
Varvara68 [4.7K]

Here you are, its that button.

4 0
3 years ago
Read 2 more answers
Routines will depend on the ______________________ and is found in every program you write.
kari74 [83]

Answer:

Open an application (Word, PowerPoint, etc.) and create a new file like you normally would. ...

Click File.

Click Save as.

Select Box as the location where you'd like to save your file. If you have a particular folder that you'd like to save it to, select it.

Name your file.

Click Save.

Explanation:

3 0
3 years ago
Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
Vlad1618 [11]

Answer:

a) 500 Kbps  b) 64 sec  c) 320 sec

Explanation:

a) We define the throughput of a network, as the actual maximum transmission rate that the network is able to deliver, which in this case is equal to the lowest transmission rate of any of the links that the traffic must go through:

R1 =500 kbps

b) If the file size is given in bytes, and we have the throughput in bps, we need to convert to bits first, as follows:

4*10⁶ bytes * (8 bits/byte) = 32*10⁶ bits.

The time needed to transfer the file, will be given by the quotient between the file size and the throughput, as follows:

t = 32*10⁶ bits / 500*10³ bits/sec = 64 sec

c) If the transmission rate R2 is reduced to 100 kbps, R2 becomes the lowest transmission rate in the network, so it becomes the new throughput.

So, the time needed for the same file to be transferred to host B is as follows:

t=  32*10⁶ bits / 100*10³ bits/sec = 320 sec

6 0
3 years ago
Other questions:
  • Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to gr
    15·1 answer
  • You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
    7·2 answers
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • The Gauss-Seidel method as an iterative technique often refers to an improved version of the Jacobi method, since the Gauss-Seid
    13·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    12·1 answer
  • Why now days 3D images are used in cartoons? What are the drawbacks of 2D image?
    14·2 answers
  • Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
    8·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • When you hear the word “stress” what does it mean to you? How does stress affect you and what do you do to cope with stress
    9·1 answer
  • Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!