1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
5

Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout

view Page Break Preview
Computers and Technology
2 answers:
Dimas [21]3 years ago
7 0

Answer:

Page Layout view

Explanation:

arsen [322]3 years ago
4 0

Answer:

C. Page layout view

Explanation:

You might be interested in
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
To create a cover letter to send to potenial employers alone with a resume what software program should you use
Alexus [3.1K]
Microsoft word? That’s the standard program used but I don’t know if there are special resume programs you learned about.
3 0
3 years ago
Which property describes if a mineral breaks down into flatpieces​
marta [7]

Answer: Cleavage

Explanation:

3 0
3 years ago
With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes rea
worty [1.4K]

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

3 0
3 years ago
True or false? If you’re posting the same content across different channels, make sure you post them simultaneously—on the same
alukav5142 [94]

Answer:

The answer is true.

Explanation:

7 0
3 years ago
Other questions:
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • How can you tell that a website is valid and reliable 10 points
    10·1 answer
  • Which tab on the Table Tools contextual tab is used to control the style and formatting of the table as it relates to colors for
    9·1 answer
  • Which of the following is an advantage of batch processing?
    8·1 answer
  • Why was Apple the best company of 2019??
    15·2 answers
  • What are the top and side margins for a letter typed in standard format?
    11·1 answer
  • A robot worker and a human worker are both vulnerable to
    5·1 answer
  • Complete the following sentence.
    7·1 answer
  • Which best describes what databases do?
    8·2 answers
  • Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!