How to use section header in word document?

Please answer fast​

Answers

Answer 1

Answer:

Configure headers and footers for different sections of a document

Click or tap the page at the beginning of a section. Select Layout > Breaks > Next Page. Double-click the header or footer on the first page of the new section.

Explanation:


Related Questions

what is a survey? plz hel​

Answers

Answer:

The act of seeing and recording information.

Answer:

a method of collecting data tell me if  i'm wrong or right plz

Explanation:

Yvonne is matting a series of photos as an anniversary gift for her parents. She hopes that they will cherish this gift for years to come but is concerned because she can’t afford the really nice mat board. What is Yvonne MOST LIKELY worried about?

A.
that the mat will turn black

B.
that the mat will take over the picture

C.
that the mat will disintegrate

D.
that the mat will discolor and deteriorate

Answers

Answer:

That the mat will discolor and deteriorate

Explanation:

D

Yvonne will most likely worry that the mat will discolor and deteriorate. The correct option is D.

What is matting in photos?

Matting is a decorative border that surrounds the artwork. It is typically built of mat board, a type of board designed specifically for this purpose. After cutting the mat board to size, one or more holes (entries) are cut in the mat board to act as windows for displaying art.

Matting is the technique of separating an image's foreground and background components. Typically, the photos are of a frame or a video file. It adds a decorative edge to the print and a mechanism for hanging the photo.

Matting involves using a front or window mat to separate the image from the frame's glass and to give an extra border around the photo.

Therefore, the correct option is D. that the mat will discolor and deteriorate.

To learn more about matting in photos, refer to the link:

https://brainly.com/question/28279935

#SPJ2

check image dont answer if you dont know please

Answers

Answer:

Explanation:

1-2nd option

2-1st option

3-last option

hope this helps!! have a good rest of ur day!! <3

People can use computers for sending ....... writing reports, listening to music and playing games. ​

Answers

Answer:

the answer is messages, emails, texts

Hope This Helps!!!

Answer:

People can use computers for sending   MESSAGES'TEXT'EMAILS   ,writing reports,listening to music and playing games....

Identifies 3 different companies that use Information Systems. Then for each company describe the WHAT the company actually uses, the HOW the company uses it, and the WHY the company needs to implement this system within itself.

Answers

Three companies that use information systems:

IBM:

This company has been using an information management system for transactional and database operations. It was first used in 1968. Till then the system has gone through many modifications as per the changing requirements of the company. The information system used by IBM helps in defining structure for database, an organization for data, query management, database transactions, etc.

Olive:

This company uses a health-based information system. The information system used by this company aims at offering customers and users a regularly updated information base. They can access current research and technical documents. The content is in simple language and accessible in many locations. It gives a portal-like feature that is used to provide data published by experts, key researchers, findings, etc.

Catalyte:

The information system used by this company is a blend of high technology and a diverse workforce. They offer machine learning guided information systems to train candidates, speed up their performance, and generate quality results. Their information systems offer new career options as well as opportunities to develop software using various forums, communities, etc.

The companies that use Information Systems are

Amazon IBMRRE Ventures

How does Ama.zon use information systems?

Ama.zon uses  information systems in a  lot of its business processes as it helps them to have good and improved efficiency in the the area of collection, storage, and analytics of all their customers' information.

Conclusively, IBM uses the information system for:

Keeping of customers information.communicating.Buying and selling etc.

Learn more about  Information Systems from

https://brainly.com/question/14688347

When do you think is the right time to use Styles,

Answers

Answer:

1. Democratic Management Style

2. Coaching Management Style

3. Affiliative Management Style

4. Pacesetting Management Style

5. Authoritative Management Style

6. Coercive Management Style

7. Laissez-Faire Management Style

8. Persuasive Management Style

In transcription Files are transcribed in:

a) Australian English
b) American English unless a client states otherwise.
c) Canadian English
d) British English

Answers

Answer:

B

Explanation:

American English unless a client states otherwise

Answer:

b american english

Explanation:

A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.

for item in data:
if item[0] == 'male':
males = males + 1
if item[___
]:
malesOnPhone = malesOnPhone + 1
Choices are 1, 2, 3. Answer is for if item[___]:

Answers

Answer:

0

Explanation:
In the lists, indexation starts from 0, because of that in if statement we compare item[0] which is 'male' and 'male', and then males is itterated within for loop.

Three steps can be taken to construct a list of elements using a for loop: Make an empty list appear. Iterate through an iterable or set of elements. Add each component to the list's end.

What loop for sample member of the list data?

An Array List can be looped through using an Iterator. If there are additional members in the Array List, the method hasNext() returns true; otherwise, it returns false. If there is no next element, the method next() raises the No Such Element Exception and returns the next element in the Array List.

FOR LOOPS and WHILE LOOPS are two popular types of loops. A For loop runs a variable number of times. LOOP TYPE — FOR LOOP When you know how many times you want to run an algorithm before stopping, you use for loops.

Therefore, Since indexation in lists begins at 0, we must compare item[0], which is “male,” with “male” in the if statement before iterating through males in the for loop.

Learn more about loop here:

https://brainly.com/question/14390367

#SPJ2



List and explain three ways study groups benefit your learning.

Answers

Answer:

Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,

1.  More support, limits chances of procrastination

     With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.

2. More people means more parts can get done effectively and taking notes is easier.

     More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.

3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.

      People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.

Which of the following Access objects provides a user-friendly data entry method?
Select one:
a. query
b. table
c. form
d. report

Answers

Answer:

Table

Explanation:

Microsoft Access uses an object called a _____ to enter and organize data.

The answer is table.

Responsible manner in video and audio conferencing​

Answers

Answer:

1.Mute yourself when not speaking.

2.Be on time.

3.Ensure your technology works correctly.

4.Use technology to fully engage remote participants.

Explanation:

You are given an array of integers. Your task is to create pairs of them, such that every created pair has the same sum. This sum is not specified, but the number of created pairs should be the maximum possible. Each array element may belong to one pair only.

Write a function

class Solution public int
solution (int[] A); }

that, given an array A consisting of N integers, returns the maximum possible number of pairs with the same sum.

Examples:
1. Given A = [1, 9, 8, 100, 2], the function should return 2. The pairs are (A[0]. A[1]) and (A[2], A[4]); the sum of each pair is 10.
2. Given A = [2, 2, 2, 3], the function should return 1. Although, for instance, A[0]+A[1] = A[0]+A[2], the pairs (A[0], A[1]) and (A[0], A[2]) cannot exist at the same time, because they both contain a common element, A[0].

Answers

Complete PYTHON code with explanation:

def solution(nums):

# form a dictionary which will store

# the possible pair's sum as key and the indexs used for the sum

sumAndpair = {}

# for every element in list nums

for i in range(len(nums)):

# iterate on all the element to the right of current element

for j in range(i+1,len(nums)):

# calculate the sum of current 2 elements

sum = nums[i] + nums[j]

# if the sum is already in the dictionay

if sum in sumAndpair:

# check if the current index have already been used

# if yes, then continue to next iteration

# this will make sure that same number have not been used more than once

if i in sumAndpair[sum] or j in sumAndpair[sum]:

continue

# if no, then append the current i and j to the value of current sum

else:

sumAndpair[sum].append(i)

sumAndpair[sum].append(j)

# if the current sum is not in the dictionary

# add the sum as key with a list of index used

else:

sumAndpair[sum] = [i, j]

# copmpute the maximum possible number of pairs with the same sum

# which will be the maximum length value out of all the possible sum

# this maximum length will be divided by 2, since a pair of i, j contrinute to one sum

maxLength = 0

for key, value in sumAndpair.items():

if maxLength

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

As a Waterfall project manager, your goal is to minimize any changes that could lead to scope creep. You want to protect your team from building something the client or stakeholders don’t want. What formal and rigorous process could you set up to safeguard against this?

Answers

The necessary things that should be done to avoid a project scope creep include documenting the project requirements and setting up change control processes.

The scope of a project simply means the work that is required in order to complete a project. On the other hand, project scope creep means the occurrence that happens when changes are made to the scope without a change request.

To avoid project scope creep, it's important to document the project requirements, set up changes in control processes, and have a clear project schedule.

Learn more about projects on:

https://brainly.com/question/4853153

state the base of correct addition of 27 + 6 =34​

Answers

Answer:

9

Explanation:

lets do calculations with ONLY the rightmost digits, ie., 7 + 6 = 4, so we're ignoring the carry.

Then, following must be true as well:

7+5 = 3

7+4 = 2

7+3 = 1

7+2 = 0 <= this reveals our base 9

7+1 = 8

7+0 = 7

difference between syntax error and semantics
error

Answers

Answer:

The syntax error is an incorrect construction of the source code, whereas a semantic error is erroneous logic that produces the wrong result when executed.

Explanation:

Syntax

It refers to the rules of any statement in the programming language.

Semantics

It refers to the meaning associated with any statement in the programming language

Where is the option to set Conditional Formatting rules found?
O Insert tab in the Formatting group
O Page Layout tab in the Styles group
O Home tab in the Styles group
Formulas tab in the Formatting group

Answers

Answer:

C. Home tab in the Styles group

Explanation:

answer on edge 2021

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.

Answers

According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.

What does it mean "Be Proactive"?

Answers

Answer:controlling a situation by making things happen or by preparing for possible future problems

Explanation:

Make things happen instead of waiting for them

hi hi hihihihihivvv hihihihihihi v vhi

Answers

Answer: hihihihihihiihihi hihihihiihihih

Explanation: hi.

Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing history true or false

Answers

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

Web cookiesCachesBrowsing history

Read more: https://brainly.com/question/3840341

match the following. dont answer if you dont know please.

Answers

Answer:

instructions= command

the background screen on a computer= desktop

an organized system= folder

list of commands= GUI

performing more then 1 task= multi tasking

an object that contains multiple files= dictionary

graphical user inference= menu

Explanation:

hope this help :)

The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows were there?​

Answers

The answer is 25 sparrows.

What is important to know from a software development perspective about this topic and its relationship with traditional operating systems? How does developing the software for each platform differ? How is it similar?

Answers

What is important to know from a software development perspective about this topic and its relationship with traditional operating systems? How does ...

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)

Answers

Answer:

I believe a bar graph would be best for me. What are your answer options though?

Explanation:

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):

Answers

Shoplifting! Did he pay for those?!?!

The given situation is an example of shoplifting.

What is hardware?

All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.

This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.

This, this would be an example of shoplifting.

Learn more about hardware.

https://brainly.com/question/15232088

#SPJ2

I have a D in one of my majors, I got a lot of 70s and I'm failing music. im in middle school. Will I be held back? Please answer this

Answers

Answer:

probably sorry it will be okay

Depends on where you’re from and what grading scale is used. I wouldn’t say you’re ruined if you push hard the rest of the year.

what was the pascaline used for?​

Answers

Answer:

Math like multiplication, addition, division, and subtraction

Other Questions
The tape diagram represents an equation...Write an equation to represent the image... An item is regularly priced at $97. It is now priced at a discount of 40% off the regular price. The Kim family just bought 7 crates of eggs, and each crate had 12 eggs. The family already had 9 eggs in their refrigerator. How many eggs do they have now? a. Anna's chemistry class is going to be experimenting with AgNO3 today, whichcan stain hands and clothes. Anna is concerned about her jewelry, so as shegets ready for school, she removes her gold (Au) ring andreplaces it with acheaper nickel (Ni) ring. Is this a good idea? Explain your answer. (3 points) i do believe that i need help Hi, anyone help me with this, pleaseA television addic can buy either two televisions and three video recorders for $1750 or four televisions and one recorder for $1250. Find the cost of one television and one video recorder how did the compromise of 1850 change the political map of texas please help me I have no idea what I'm doing :( bobby has two poatatos he wants more so he pick 100 mor he sharees them amongst three friends EQUALY how many poatatos does each friend get? A large tank of fish from a hatchery is being delivered to a lake. The hatchery claims that the mean length of fish in the tank is 15 inches, and the standard deviation is 3 inches. A random sample of 41 fish is taken from the tank. Let x be the mean sample length of these fish. What is the probability that x is within 0.5 inch of the claimed population mean? (Round your answer to four decimal places.) What constitutes hiking?O A designated hiking routeO Going with a group of peopleO Walking on different terrainsO Spending the night in a sleeping bag These desert dwelling goats spend time in the steep mountainous terrain. Question 4 options: Nubian Ibex Arabian Gazelle Dromedary Oryx 7(2e-1)-3=6+6e pls help and do step by step Which of the following outcomes is a benefit of conventional agriculture? Which sentence most likely describes the conflict in a story?A. Maria met Karina on the second day of middle school, when Karina fell in gym class.B. Maria and Karina believe that they will be best friends forever, or at least through high school.C. Maria thought Karina was her best friend, but lately Karina has been avoiding her.D. Maria convinced Karina to meet her at a mutual friend's house, where they worked things out. Imagine that there is a small rocky body caught by Earths gravity. Draw a comic-strip cartoonto illustrate its journey as it travels through space toward Earth, enters Earths atmosphere, andlands on Earth. Describe your illustration with narration or speech/thought bubbles. Include theuse of these key terms: atmosphere, meteor, meteoroid, meteorite. Kim has a bag of 8 basketballs. Each basketball weighs 6/10 kilogram. What is the total weight of the basketballs, in kilograms? If each quadrilateral below is a rectangle, find the missing measure. Mark sews at a constant rate. He stitches 5 pillows in 8 minutes. What is the constant of proportionality for the relation of pillow to hours. please help ill mark brainliest