answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
2 years ago
13

How can rows be added to a table? Check all that apply

Computers and Technology
2 answers:
svlad2 [7]2 years ago
6 0
<h2><em>1) By drawing a row in the table using the draw option. </em></h2><h2><em> </em></h2><h2><em>2) By using the insert option under the Table Tools tab. </em></h2><h2><em> </em></h2><h2><em>3) By designing the table with an added row using the Design tab.</em></h2><h2><em></em></h2><h2><em>HOPE IT HELPS (◕‿◕✿)</em></h2>
creativ13 [48]2 years ago
5 0

Answer:

b and e

It's b (by using the Insert option under the Table Tools tab) and e (by clicking the plus sign that appears on the left side of the table)

Explanation:

I just did this on edgenuity, hope this helps! :)

Guest
1 year ago
It’s this oneeeee
You might be interested in
Robin wants her presentation to move from one slide to another with special motion effects. Which option should Robin use?
topjm [15]
If this is in power point, then she should use the <em>transitions </em>tab on the ribbon. =)
3 0
2 years ago
Read 2 more answers
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
Gnesinka [82]

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

5 0
2 years ago
To what extent are the following computer systems instances of artificial intelligence:
ss7ja [257]

Answer: Supermarket bar code scanners and Voice-activated telephone menus are not instances of artificial intelligence

Explanation:

(a)Supermarket bar code scanners are only able to read the code however they are not able to perform any kind of machine learning techniques to be able to learn a sequence from the codes. As machine learning is a important part of artificial intelligence (AI) so they are not instances of AI. Similarly for Voice-activated telephone menus they could only display and cannot perform any intelligent task.

Web search engines and Internet routing algorithms are very dynamic and intelligent in processing and retrieving information to the end user.

So they are instances of AI.

8 0
2 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
2 years ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
2 years ago
Other questions:
  • What might be one reason why a stock becomes more valuable over time
    5·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
    6·1 answer
  • Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention
    9·1 answer
  • Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less
    10·2 answers
  • (Displaying a Sentence with Its Words Reversed) Write an application that inputs a line of text, tokenizes the line with String
    6·1 answer
  • A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
    15·1 answer
  • Create a different version of the program that: Takes a 3-digit number and generates a 6-digit number with the 3-digit number re
    14·1 answer
  • In below freezing conditions, keep your fuel level at least _________ full to keep moisture from freezing in your gas line.
    13·1 answer
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!