answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
2 years ago
9

After modifying a numbered list in her presentation, Su notices the numbers and the text are too close to each other. She knows

she can solve this issue by using the hanging indent marker. Unfortunately, the ruler is not visible in her PowerPoint workspace.
Which tab and command group should she use to access the ruler? (View, Show or Insert, Add-ins or Home, Paragraph)
After selecting the numbered list, in which direction should she drag the hanging indent marker to increase the space between the numbers and the text? (upward or downward or to the left or to the right)
Computers and Technology
1 answer:
IrinaK [193]2 years ago
8 0

Answer:

1. View, show

2. to the right

Explanation:

On edg

You might be interested in
Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
ad-work [718]

Answer:

3

Explanation:

ER model can be used and is based on three basic concepts: Entities, Attributes & Relationships.

An entity can be place, person, object, event or a concept, which stores data in the database.

Relationship is nothing but an association among two or more entities. A weak entity is a type of entity which doesn't have its key attribute.

3 0
2 years ago
__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
umka21 [38]

Answer: Lattice-based, non-discretionary

Explanation: Lattice-based access control is a form of non-discretionary access control in which users are assigned a matrix of authorizations for particular areas of access. Lattice-based access control are usually used to restrict or define the level of authorization granted to a subject which may be an individual, organization or group or the that given to the object which may include applications and computers.It utilizes a non-discretionary approach whereby the defined access is uniformly enforced across all subjects and objects within the confines of an information system.

3 0
2 years ago
4. When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirem
Vikentia [17]

Answer:

Incremental model

Explanation:

Incremental model is the best modification in older version are feasible and can be easily managed.

Incremental model involves the technique of developing soft ware in which the product is designed implemented and tested in stages until the product is finished. The term finished here means the product as meet all its requirement.

This model entails development as well as maintenance.

7 0
2 years ago
12) Suppose you wanted a subroutine to return to an address that was 3 bytes higher in memory than the return address currently
Snezhnost [94]

Answer:

.code

main proc

mov ecx,ebp

mov ecx, 787878

push ecx

call MySe7en

invoke ExitProcess,0

main endp

MySe7en PROC

pop ecx

sub ecx, 3

mov

push ecx

ret

end main

8 0
2 years ago
Which type of word processing programs enables us to include illustrations within the program?
bonufazy [111]

Answer:

C.  full featured

Explanation:

You need to make use of the full-featured version of the word processing programs to use the illustrations that are part of the program. And simple versions might not have that. By fully featured it means you need to have the license included or else you will be able to use it for a few days or a maximum of 3 months, and that is certainly not a good idea.

5 0
2 years ago
Other questions:
  • One of the most toxic components of a computer is the
    11·1 answer
  • _________ is a term used to describe the process of recording movement of an object and translating it into a digital format..
    8·2 answers
  • Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p
    8·1 answer
  • Someone else can drive your car if _____.
    12·2 answers
  • Which two factors most influenced the growth of the Internet during the 1970s?
    7·2 answers
  • The elements of an integer-valued array can be initialized so that a[i] == i in a recursive fashion as follows: An array of size
    10·1 answer
  • Which of the following sorting algorithms is described by this text? "Take the item at index 1 and see if it is in order compare
    10·1 answer
  • 1. The precious metals needed to make computer chips, graphic cards, and transistors are found in only a small population of cou
    8·1 answer
  • Dante has a worksheet shared with multiple users. He would like the ability to approve or reject changes that are made. Which fe
    12·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!