Captions are texts that provide the description of a figure or a table.
Complete the blanks using: below and above
When adding captions to an object, the location of the caption is as important as the caption itself.
The location of the caption for the objects of word documents are:
Images - Caption are placed below imagesFigures- Caption are placed below figuresTables- Caption are placed above tablesHence, the complete text is:
figures and tables are always accompanied by legends or captions located ____below____ figures and ___above_____ tables.
Read more about captions of figures and tables at:
https://brainly.com/question/18710734
Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.
boolean logic deals with statements having one of _____ values.
Answer:
2 values
Explanation:
boolean statements can only be True or False
pasagot po pls
tle-6
Which is the most protective and secure anti virus software?
Answer:
In most cases you should just use an anti virus software that comes with that operating system. But if you would like a third party application try using kaspersky anti virus in my opinion it is simple and user friendly. It can most probably block any malware expect for ones that are new like one day old, it will take somwhile to add it to the database.
What is the two’s compliment of -95,-122,-111,-57
Answer:
-95 0101 1111
-122= 0111 1010
-111= 0110 1111
-57 = 0011 1001
Explanation:
two's Compliment of
- 95 = 0101 1111
-122= 0111 1010
-111= 0110 1111
-57 = 0011 1001
Order the steps to describe how to import a contact list in Outlook 2016.
Answer: above is correct
In Backstage view...
Click Import/Export
Choose Import from...
Select CSV format...
Choose a destination....
Explanation:
The steps followed to import a contact list in the Microsoft Outlook 2016 are:
In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.What is Outlook 2016?The Microsoft Outlook 2016 is a software system that helps the users to manage their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.
The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.
Learn more about Microsoft Outlook , here:
https://brainly.com/question/26695071
#SPJ2
what is the general term for programs used to operate a computer
Answer:
Software
Explanation:
ez
Answer: A Software System
what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?
Answer:
Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab
Explanation:
You did not explain what Campus your on however you can find this yourself pretty easy.
how to disappear completely from the internet pc magazine
In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.
The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.
The steps that are needed to disappear from the internet include:
Delete your social network accounts.Delete your email accounts.Use search engines to track your old activities online and delete them.Falsify the accounts that can't be deleted.Unsubscribe from mailing lists.Read related link on:
https://brainly.com/question/24902823
A_______VPN connection is a private network that uses a public
network to operate.
A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site
Answer:
letter c. point to site po sagot diyan
what is bitcoin??????
Answer:
a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.
Explanation:
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand
You are working with an older relative who is writing their last will and testament and you two are sharing the document back and forth, making edits as you go. Explain how you could use Word to keep other people from changing the text of the file, while still allowing you and the relative to make changes.
Answer:
In word there is a setting where you can mange all of user's permission in the document. These are a few permission settings: Read only and Can edit.
Word to keep other people from changing the text of the file, while still allowing you and the relative to make changes with the help of Read-only and Can edit.
What is a document?A document is a category of data that such a person or group of users may find beneficial. There is both digital and back into old patterns forms of this information.
There is a setting that allows you to control every user's permissions in the file. A few authorization parameters are as follows: both read-only and editable. Making a text a read-only file allows it to be duplicated or viewed, but not changed.
If any of the evaluators attempts to alter a read-only file, the modifications cannot be committed by renaming the document or saving it in a different place.
Learn more about document, here:
https://brainly.com/question/27396650
#SPJ2
What is the maximum number of guesses it will take to find a number
between 1 and 64?
Answer:
10?
Explanation:
what is the answer ??
Answer:
2nd answer is braille printer1st one is MICR .80percent sure 20 percent not
[tex]▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ { \huge \mathfrak{Answer}}▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ [/tex]
1. Correct choice - MICR
MICR characters are written using oxide of Iron.
2. Correct choice - Braille printer
Braille printer is the device used to give output which can be read by visually impaired people.
what does it mean to clear a setting in a dialog box?
Answer:
to delete it
Explanation:
Question # 10
Multiple Choice
Why would a beginning photographer have had a more difficult time learning the art in the early 1900s than now?
Answer:
cameras were fully Manuel
which way do you swipe in the android os to access shortcuts on the notification bar?
Answer:
you swipe downwards
please vote me brainliest thanks:)
what does it mean when the save button on the quick access toolbar changes to a circular set of two arrows?
When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud (It means word is automatically syncing your changes back to OneDrive).
The Quick Access Toolbar (QAT) is simply known as small modifiable toolbar. It is often located at the top of the office application window that is, it can be seen next to the Microsoft Office button. It is known to have its own set of independent commands and render quick access to commands like Save, Undo, Redo, etc. OneDrive is a renown Microsoft cloud service and a type of cloud services that helps individuals to link up oneself to all our files. It allows storage and protection of files, sharing and get to them any time.Conclusively, we can say that When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud (It means word is automatically syncing your changes back to OneDrive).
Learn more from:
https://brainly.com/question/17163678
Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​
Answer:
A.
Explanation:
Mark Brainliest if correct!
Answer: Previewing a text. (C)
Explanation: Just got it right.
what is the set of events that occurs between the moment you turn on the computer and the moment you can begin to use the computer
Answer:
Booting
Explanation:
Booting is the process that occurs when you press the power button to turn your computer on. During this process (which may take a minute or two), the computer does several things: It runs tests to make sure everything is working correctly. It checks for new hardware.
Please please help ASAP please
Answer:
he say yes would i do so way 2 be hey i oh peepo
Explanation:
did someone hang themselves on the wizard of oz set
Answer:
false
Explanation:
false it is a myth you
what must you ensure if your work involves the use of different types of smart card security tokens
Answer:
Avoid a potential security violation by using the appropriate token for each system.
what version of vsftpd contained the smiley face backdoor?
Answer:
Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.
Explanation:
The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.
What version of vsftpd had smiley face backdoor?Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.
The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.
causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.
Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.
For more information about vsftpd had smiley face backdoor, click here:
https://brainly.com/question/535743
#SPJ6
Explain the operation of an electric circuit in terms of voltage, current, and charge.
Answer:
If its open its broken if its closed electricity flows
Explanation:
qbasic program to check whether an entered number is positive or negative or neutral
Answer:
CLS
INPUT "Enter a number: ",N
IF N > 0 THEN
PRINT "The number is Positive."
ELSEIF N < 0 THEN
PRINT "The number is Negative."
ELSE
PRINT "The number is Zero."
END IF
END
based on mla guidelines, what is the correct line spacing?
Answer:
Double spaced lines are correct.
Explanation:
And for works cited use double indent
Can someone help me please?
Answer:
ummm this is hard i think answer is 5 robuk am pro
Explanation:
cuz me say soo
Select the correct answer.
Which statement is true with respect to Java?
Answer:
where are the options ..... to select