1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
2 years ago
6

Where can page numbers appear? Check all that apply.

Computers and Technology
1 answer:
umka2103 [35]2 years ago
4 0

Answer:

in the header in the footer

Hope it helps!!!

Explanation:

You might be interested in
What is the next line?
Evgen [1.6K]

Answer:3

Explanation: it’s 3

3 0
3 years ago
Read 2 more answers
Annie is a nutritionist. She is conducting seminars about following a healthy diet in various offices. Annie adds a picture of f
Novosadov [1.4K]

I believe in this case you would be using Clip Art.

Smart Art is used on words to make graphics usually.

Graphs are not pictures

Shapes are completely different


8 0
2 years ago
Read 2 more answers
Linguist study_____
-Dominant- [34]
That's B.

Linguist love all kinds of studies of languages culture writing etc.
6 0
2 years ago
Which of the following refers to the bottom pane of the Wireshark window where all of the information in the packet is displayed
Lorico [155]

Answer:

D) Hex Pane.

Explanation:

Hex Pane  is the bottom pane where whole information in the packet is shown in hexadecimal format on the left and also in character when possible and decimal also.It is the bottom pane of Wireshark window.

So we can say that Hex pane is referred to the bottom pane of the Wireshark window which displays the information in hexadecimal on the left .

5 0
2 years ago
Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the
Ira Lisetskai [31]

Answer: A. OAuth

Explanation:

OAuth is one of the process by which different applications basically the third party applications can have access to account details of the end users. Here the process is completely governed by the principles of authorization protocols. Similarly in OAuth the access to the details of the end users are maintained by the process of a token. The third party upon access of the token is able to access the end users account information.

OAuth was established in 2007 and works on the framework of the open source federation.

So in this regard IIya would be recommended OAuth technology for her federal system technology.

8 0
3 years ago
Other questions:
  • What is the most effect way to include space after each paragraph
    14·1 answer
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • Describe two ways in which an organizer can assist in taking notes
    8·2 answers
  • Jenny is working on a laptop computer and has notices that the computer is not running very fast. She looks and realizes that th
    6·2 answers
  • How did The Gates by Christo and Jeanne-Claude affect the site?
    11·2 answers
  • If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5
    13·1 answer
  • A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
    13·2 answers
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!