1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
8

To insert an endnote, which steps should you follow?

Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
6 0
<span>To insert an endnote, you should follow he following steps:
A.Place the cursor in the document where you want the note reference mark to appear, select Insert Endnote command from the Reference tab in the Footnotes group.
Correct answer: A
</span><span>This way a reference mark would be added in the text and the endnote will be added at the end of the document.</span>
You might be interested in
What are examples of templates the Input Mask Wizard offers? Check all that apply.
Vesna [10]
The answer is A B AND D mark me brainliest?
5 0
3 years ago
Read 2 more answers
A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
ch4aika [34]

Answer:

B.O(n).

Explanation:

Since the time complexity of visiting a node is O(1) in iterative implementation.So the time complexity of visiting every single node in binary tree is O(n).We can use level order traversal of a binary tree using a queue.Which can visit every node in O(n) time.Level order traversal do it in a single loop without doing any extra traversal.

8 0
3 years ago
Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
kvv77 [185]
The movie was way better, though the actors in tge musical did a good job. Shrek
8 0
3 years ago
Read 2 more answers
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
Burka [1]

Answer:We start each project to get some business benefits. We design it to achieve users and other stakeholder’s satisfaction. And we build it to improve organization KPIs. But, we live in a world where the project faces many uncertainties. These uncertainties or risks can prevent from achieving our project goals or objectives. So, it is critical that we identify them in time to take care of their effective responses.

The more we know our risks, the more we can evaluate and prioritize them timely for:

Reducing their probable negative impacts, or

Increase their likely positive impacts

We can use Qualitative Risk Analysis and Quantitative Risk Analysis techniques to evaluate and prioritize risks. I see there are a lot of confusions around how these two techniques are different from each other.  In this blog, I will address these confusions and differences between these two techniques.

Before we get into the difference between qualitative and quantitative risk analysis/assessment, it is mandatory to understand how we perform risk analysis in projects.  Below is the summarized demonstration of the risk analysis:

Explanation:

8 0
3 years ago
Other questions:
  • If you know about 3D printers could you help me fix mine?
    8·1 answer
  • If you are a driver under 21 with a breath or blood alcohol level of ____ or higher, you will be required to attend a substance
    11·2 answers
  • State whether true or false.
    6·1 answer
  • Which of the following are typically an example of primary resources?
    13·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Weak Induction
    8·1 answer
  • True or false when a host gets an IP address from a DHCP server it is said to be configured manually
    15·1 answer
  • What is also known as computer Network?
    6·2 answers
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!