1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
5

Which steps are needed for Word to create an Index? Select two options.

Computers and Technology
2 answers:
AleksAgata [21]3 years ago
8 0

Answer:

insert index

Explanation:

marysya [2.9K]3 years ago
5 0

Answer:

Insert Index

Explanation:

You might be interested in
How does a Computer chip work?
Arlecino [84]
A computer chip is a data space stored on your computer. It is there to to keep all of your computer information in it therefor. A computer chip works with your computer to help it work.
4 0
3 years ago
Read 2 more answers
Does the security burden fall primarily on the user? On
liubo4ka [24]

Answer:

yes and no because of the security

Explanation:

yes and no because of the security

6 0
3 years ago
Which term was used to define the era of the Internet, when the web became a "platform" for user-generated input, as opposed to
Pachacha [2.7K]

Hello, The answer to your question is:-

<em><u>Option </u></em><em><u>"</u></em><em><u>Web </u></em><em><u>2</u></em><em><u>.</u></em><em><u>0</u></em><em><u>"</u></em>

<em><u>Reference and proof</u></em>:-

Web 2.0 refers to websites that emphasize <u>user-generated content</u>, ease of use, participatory culture and interoperability (i.e., compatible with other products, systems, and devices) for end users.

Hope it helps you...

Answered by Benjemin ☺️

✅

5 0
3 years ago
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
A listed electrical box for use in fire-resistive assemblies is being installed in a 2 hour rated wall. Assuming there are no ot
gtnhenbr [62]

Answer:

b. 1/8"

Explanation:

In This scenario this installation does not require any penetration protection as long as the space between the electrical box and the wall membrane does not exceed 1/8 of an inch. This is mainly a safety precaution to prevent accident's such as an electrical fire or electrocution as well as meeting the specs for the rest of the house to be built perfectly without modifications.

6 0
4 years ago
Other questions:
  • "what are two elements found in an email address?"
    7·1 answer
  • Many web pages today use ____ —small text files that are stored on your hard drive by a web server, typically the one associated
    6·2 answers
  • With a(n) ____ the editor, compiler, and executer are combined in the same application.
    7·1 answer
  • A voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express. To ena
    6·1 answer
  • Are all tps dashboards
    15·1 answer
  • I thought the answer was senior manager see on google it says
    8·1 answer
  • A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 re
    5·1 answer
  • When it comes to having certain sales skills as a hotel manager, being able to really hear, learn about, and show customers that
    10·1 answer
  • Which input and output pair is correct for a bicycle?
    12·1 answer
  • You add a filter by condition, and set the condition to [weight]&gt;50. how will this affect your data?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!