answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
2 years ago
4

Angelina now wants to add her name and the date to the header of her report. Which actions can she take to access the header? Ch

eck all that apply. Double-click any location within the header. Click the Insert tab, and click once in the header. Click the Edit Header option of the Header icon. Click Page Break in the Header and Footer group. Place an insertion point in the space below the header.
Computers and Technology
1 answer:
Karo-lina-s [1.5K]2 years ago
7 0

Answer: Double-click any location within the header. Click the Edit Header option of the Header icon

Explanation:

You might be interested in
Kyle took a photograph of his sister, but he later noticed that his lens was marginally out of focus. Which tool can he use to i
Temka [501]

Answer:

Unsharp Mask tool

Explanation:

I just took the test and got it right

5 0
2 years ago
Sean is forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, i
Gwar [14]

Sean is using FUNCTION POINT (d) method for forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, inquiries, files, and interfaces.

Explanation:

  • The function point is a "unit of measurement" to express the amount of business functionality an information system (as a product) provides to a user.
  • The outcome of a function point count provides the metric 'unit of software delivered' and can be used to assist in the management and control of software development, customisation or major enhancements from early project planning phases, through to the ongoing support of the application.

6 0
2 years ago
What will be the output of the following Python code? class A: def test1(self): print(" test of A called ") class B(A): def test
Vlad [161]

Answer:

"test of B called"

Explanation:

  • The object is created for the D class, but there are two test methods in class B and C.
  • The D class does not hold any test method. So when the object called the test method. Then the B method is called.
  • It is because the B class is declared first in the inheritance of D class like in the statement "class D(B, C)".
  • If the statement will be "class D(C, B)", then the C method will be called.
  • if the D class holds the method test, then only the D method will be called.
  • Hence the output is "test of B called".
7 0
2 years ago
A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.
Minchanka [31]

Answer:

10.1.1.150:80

Explanation:

Socket address is the combination of an IP address and port number.

HTTP is what most unencrypted webpage use, instead of HTTPS which is the encrypted version of HTTP.

By default, webserver using Hypertext Transfer Protocol (HTTP) uses a standard port known as port 80.

The Socket address which is the combination of the IP address and standard port number will be something like this:

10.1.1.150:80

3 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
2 years ago
Other questions:
  • Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
    11·1 answer
  • How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
    5·1 answer
  • When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to d
    9·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • Create an abstract Division class with fields for a company's division name and account number, and an abstract display() method
    14·1 answer
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
    9·1 answer
  • Which OS function does a CLI fulfill? A User interface B Running applications C Hardware interface D Booting
    8·1 answer
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!