1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
3 years ago
9

Which information can you apply to every page of your document with the page layout options?

Computers and Technology
1 answer:
igomit [66]3 years ago
3 0

Answer:

Header and footer

Explanation:

The page layout tab usually found in document programs such as Microsoft Word hold options used to configure several page options which is to be applied to a document. The page layout option gives users options to set page margins, orientation, page numbering, indentation and the other page layout options which is primarily how we would like our document to look like when printed. The page layout option also allows the insertion of a header and footer which is a note which can be written at the topmost and bottomost part of the document. Once, a header and footer option is selected, it is applied to every page of the document being worked on at the moment.

You might be interested in
What safety feature melts to protect a circuit? a. fuse b. diode c. three-prong plug d. transistor
babunello [35]
The correct answer is A. fuse.
8 0
3 years ago
Read 2 more answers
Help on What i should say to my IT school lady? Read all three pages
avanturin [10]

Answer:

if you were to rest my would I still be able to have all my stuff that I have done if so I think you could reset it for me

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
What's the technique of drawing a 3D object with one vanishing point?​
zepelin [54]
I don’t no it brother n I was searching for this answer can u plz tell me
7 0
3 years ago
Read 2 more answers
To find detailed information about the origin of an email message, look at the ________________.
Valentin [98]
Email header. The email header is a code snippet in an HTML email, that contains information about the sender, recipient, email's route to get to the inbox and various authentication details
8 0
3 years ago
Other questions:
  • Choosing the “Quick Print” button will ____________.
    14·1 answer
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • The bluecross blueshield federal employee program (fep) is a(n) __________ health benefits program established by an act of cong
    8·1 answer
  • PLZZZZZ NEED HELP!!!!!!
    5·1 answer
  • Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
    12·1 answer
  • What is one of the first steps a financial planner might take when working with a client?
    14·2 answers
  • For Excel:
    5·1 answer
  • I need them on this question
    5·1 answer
  • 8. Explain strategies employed by the operating system to ensure safety of programs and data in
    15·1 answer
  • What's the differences between jojoy and moddroid???
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!