based on mla guidelines, what is the correct margin width?

Answers

Answer 1

Answer:

Leave 1 inch margins on each side.


Related Questions

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

what type of malware prevents you from accessing files

Answers

the anwser is _______________ ———_____

Which decimal number is equivalent to this hexadecimal number?
F8

A.
24
B.
143
C.
248
D.
264

Answers

Answer:

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

(F8)16 = (248)10

Step by step solution

Step 1: Write down the hexadecimal number:

(F8)16

Show each digit place as an increasing power of 16:

Fx161 + 8x160

Convert each hexadecimal digits values to decimal values then perform the math:

15x16 + 8x1 = (248)10

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.

A.
True

B.
Fale

Answers

Answer:

True

Explanation:

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

figures and tables are always accompanied by legends or captions located ________ figures and ________ tables.

Answers

Captions are texts that provide the description of a figure or a table.

Complete the blanks using: below and above

When adding captions to an object, the location of the caption is as important as the caption itself.

The location of the caption for the objects of word documents are:

Images - Caption are placed below imagesFigures- Caption are placed below figuresTables- Caption are placed above tables

Hence, the complete text is:

figures and tables are always accompanied by legends or captions located ____below____ figures and ___above_____ tables.

Read more about captions of figures and tables at:

https://brainly.com/question/18710734

4.) Food cost for your restaurant is about $.38 on the dollar. That means for every dollar
in sales, you spend 38 cents in food cost.
Figure out the food costs for the following days' sales:
Monday: $3,459.00
Tuesday: $2,976.81
Wednesday: $3,185.32
Thursday: $3,562.91

Answers

Answer:

38 cents on the dollar means that the cost is 38%. So for each of the costs, multiply by 0.38 (38%) to get the cost.

$3459*0.38=$1314.42

$2976.81*0.38 = 1131.1878 or about $1131.19

etc.

what is the answer ??​

Answers

Answer:

option 1 is correct go with 1s .

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

did someone hang themselves on set of wizard of oz

Answers

Answer:

One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.

Explanation:

please help me i will give brainly

Answers

Answer:

CPU: central processing unit.

Operating System: system software that is installed on a computer to control and organize its component parts.

RAM: random access memory.

save as: command in the File menu that enables users to save their file to a different location.

Folder: an object that contains multiple documents or files.

icons: pictures that represent different commands or actions that you want the computer to perform.

Directory: index of all the files stored on the computer.

FAT: an organizational system used to organize files.

explain at least three important events during the first generation of programming language?

Answers

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.

what guidance identifies federal information security controls?

Answers

Answer:

FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.

What is Personally Identifiable statistics?

Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.

The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.

Read more about the security :

https://brainly.com/question/26260220

#SPJ2

Imagine that over the past few weeks, you have experienced an abundance of pop-up ads

appearing when you are using the Internet. You'll also noticed that your computer is

working more slowly than usual.

In a 200 - 300 word essay, diagnose the problem with your computer and explain what can be done to remedy the issue. In your essay, use information from the lesson to justify your

diagnosis and solution.

I

Answers

Answer:

Look below

Explanation:

You open the computer that you recently purchased and it is running slower than usual and your experiencing popups

What most people would think is that a virus has infected their computer. This can be diagnosed via a free online (REPUTABLE) tool such as Malwarebytes. If the tool detects a virus it can remove it and this will 99% of the time fix the problem.

Now after you have solved the problem there is another thing to learn, viruses don't just catch computers like a real virus so its User Error either by the owner of the computer or someone with access, If you are the only one who uses the computer you should learn some online safety such as not visiting websites people wouldn't consider reputable and don't run sketchy files (EXE, JAR, etc) don't download anything from a source you don't trust.

If it was a family member or friend's fault explain internet safety to them and how sometimes a simple mistake of not double-checking the website can lead to a virus. One time I was installing java on a friend's computer and just clicked the first link (an ad) not Javas website and it ended up in me getting in some trouble.

However, if you have solved the virus issue and your computer is still being slow you should check if Windows has been damaged, you can do this via Command Prompt a program that comes with your Windows Machine. Just type "sfc /verifyonly" and it will find if your windows files have been damaged.

-END

256 words

Pls mark me Brainliest i worked hard on this. Your assignment asks for information on the lesson however i used some complicated solutions to make up for that so your teacher/professor thinks your smart

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

it refers to the kind of activity that you are going to perform or methods of training to used

A.type
B.frequency
C.intensity
D.time

Answers

I believe the correct answer is “type”

Which THREE of the following practices conform to good email etiquette?

using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation

Answers

Answer:

including a salutation, including a closing, and using correct spelling and punctuation.

Explanation:

A salutation is a greeting. It is always good etiquette to greet someone.

You do not want to end your email abruptly. Use a good closing.

It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.

Using correct spelling and punctuation, include a closing, and including a salutation

1. Define the term M.A.N.

Answers

He is right I got it correct Thanks:)

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

Which of the following numeric values is considered a floating point?
A. 16
B. -16
C. 1.6
D. 160

Answers

Explanation:

B.-16

Because the things is that idk

what sort of software programs are used to determine are of origin

Answers

Answer:

Explanation: Tools used to determine area of convergence and area of origin include: Elastic strings and protractors. Mathematical equations - (tangent trigonometric function) Computer software programs such as BackTrack™ or Hemospat.

What is a network?
A. The main idea or information contained in a media piece
B. Many people or things that are individually connected to one
another
C. A means of mass communication in print and other forms
D. A group of individuals who share the same ideas and values

Answers

Answer:

it is A and have a wonderful day

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?

Answers

Answer:

DDR

Explanation:

DDR is the only type of RAM that runs on 184 pins, its successor DDR2 was upgraded to run on 240 pins.

Hope this helps!

Is 1/5 a rational number, interger, whole number, and natural

Answers

Answer:

1/5 is a rational number.

Explanation:

Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.

Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).

Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).

As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.

when backing up an ios device to a cloud service the first recommended step is to

Answers

Answer:

make sure that your device is connected to wifi

Explanation:

I think that's the answer because cloud service needs wifi (duh). Hope this helps!

Answer:

The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house
Other Questions
You are selling tickets for a high school play. Student tickets cost $5 and general admission tickets cost $7. You sell 103 tickets and make a total of $561. How many of each type of ticket did you buy? What is the role of tRNA during translation?O A. It moves the codons into a chain.B. It provides the code for the protein.O C. It translates from amino acids to nucleic acids.O D. It moves the amino acids into a chain. It is..orange ( Add an artificial) to build a fire objective summary A regular polygon has 20 sides work out the sum of the interior angles of the polygon work out the size of the interior angles A rectangular park 60 yards long and 50 yards wide. Plans call for increasing both the length and the width by x yards. a. Write a function to find the new length of the park. b. Write a function to find the new width of the park. c. Write a function to find the area of the park after increasing both the length and width. The U.S. government had every right to imperialize and acquire more territory? Which word names the way the different parts of language are arranged?GrammaPronunciation Structure Diction What is the answer to T=4,500(1.05)^100? Define the form of language used in the following sentence:The kid I babysat tonight certainly was a handful.O A. EuphemismB. DoublespeakO C. Formal toneO D. Slang I will give correct answerbrainlist What us 2 1/3 divided by 1 1/2 in mixed number form? What are the three kinds of muscle tissues? Where is each located? What tells a muscle when to contract? Idaho has winter, but Florida does not.TrueFalse 4. What is the difference between Communism and Capitalism?Provide at least one specific example of how it is different tolive in a Capitalist v. Communist society in regards to theEconomy/Consumers/Producers.HELPP Angry immigrants lashed out against the wealthy and blacks. Why these two groups? Please help and thank you!! Glenda wants to find out how often people in her town visit the cinema.She collects data from 10 people standing in a queue outside a cinema. the answer choices areA. amB. isC. areD. be A pencil making machine took 110 of a second to make enough pencils to fill 19 of a box. At this rate, how long would it take the machine to fill the entire box? it refers to the kind of activity that you are going to perform or methods of training to usedA.typeB.frequencyC.intensityD.time