Which elements of text can be changed using automatic formatting? Check all that apply. smart quotes accidental usage of the Caps Lock key fractions the zoom percentage the addition of special characters

Answers

Answer 1
smart quotes.fractions.the addition of special characters.
Answer 2

Answer

unexpected usage of the Caps Lock keyquick quotesthe zoom ratethe extension of special appearancesdivisions

Explanation:

As you typewriting, Word automatically converts orderly quotation points ( ' or " ) to rolled quote checks (also known as "quick quotes" ).

Exceptional characters are common characters that don’t look on regular keyboards; but once included, they view the similarly as keyboard characters.



Related Questions

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt the servers' answers to routine dns queries from other systems on that network.

Answers

The answer is DNS Cache Poisoning

Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.

       




What is the smallest gear in a gearbox?

A. Rack Gear
B. Wheel Gear
C. Pinion Gear
D. Worm Gear
E. Spur Gear

Answers

I believe it is the worm gear, I am not a mechanic. sorry if I am wrong

In a gearbox, the smallest gear is referred to as the Pinion Gear, usually the driver gear, which engages with larger gears or racks to transmit motion and create a mechanical advantage in torque.

The smallest gear in a gearbox is the C. Pinion Gear. A pinion is typically the smallest gear in a gear set and works in conjunction with larger gears or racks. When comparing gears such as worm gears, spur gears, and rack-and-pinion systems, the pinion would be the smaller driver gear in terms of the physical size and number of teeth.

Worm gears, for instance, consist of a worm that drives a worm wheel, which tends to be larger. Similarly, in a set of spur gears or a rack-and-pinion system, the pinion gear is the one that transmits motion to the larger gear(s) or rack. Gear ratios help us understand this relationship, as a small driver (pinion) gear will rotate more times to cause one rotation of a larger driven gear, demonstrating a mechanical advantage in torque.

To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.

Answers

That should be the replace function which performs word replacements in documents.

"write code that prints: countnum ... 2 1 your code should contain a for loop. print a newline after each number. ex: countnum

Answers

public procedure countdown (countnum: integer)
begin
     while countnum > -1 do begin
           System.out.printline(countnum);
           countnum := countnum - 1;  
     end;

end



Organizations such as​ facebook, google+, and linkedin are termed​ ________, since they provide the platforms that enable the creation of social networks.

Answers

The question above has multiple choices;

a.social media communities
b. social media content
c. social media providers
d. social media participants
e. social media enablers

The answer is (C) Social Media Providers

Social media is a collection of online communications dedicated to interaction, community based input and content sharing and collaboration. The prominent social media platforms well known to as are Facebook, Twitter, Pinterest, and many more.






What is zenmap typically used for? how is it related to nmap? describe a scenario in which you would use this type of application?

Answers

Zenmap is the graphical User Interface representation for NMAP Security Scanner. It is an open-source program designed to make NMAP easy for starters to use. Typically, it is used to collect and identify a list of hosts, OS, as well what services are running on them by using a port scanning tool. It is used specifically for the scanning and vulnerability phase of ethical hacking.

A network administrator who wishes to audit all the devices on a specific IP scheme in a network can use NMAP. The admin can go ahead and scan the ports to know exactly which ports are closed and which are opened.






An automotive engine's camshaft rotates at

A. one-quarter the speed of the crankshaft.
B. twice the speed of the crankshaft.
C. one-half the speed of the crankshaft.
D. the same speed as the crankshaft.

Answers

C)

An automotive engine's camshaft rotates at one-half the speed of the crankshaft.

Answer: The correct answer is choice C - one-half the speed of the crankshaft.

Explanation: An automotive engine’s camshaft rotates at one half of the speed of the crankshaft. There are two full rotations of the crankshaft for each rotation of the camshaft.

How is a source file different from a "listing file"?

Answers

E-filing technical information - acceptable native (or source) electronic file format types. ... Whenever possible, the electronic source files used to create the PDF should be uploaded after the PDF in the same filing. Multiple source files can be uploaded in the same filing.

Enter a formula in cell b7 to calculate the average value of cells b2:b6

Answers

The answer is =AVERAGE(B2:B6)
Or, you can just go to "HOME" tab, then click the arrow down next to AutoSum, click the AVERAGE, then select B2:B6.
Average, which is also called arithmetic mean,can be calculated manually by adding all the numbers in a set, then dividing the count of the numbers in a set. But, in excel, there are shortcut formulas to calculate it.

Final answer:

To calculate the average of cells B2:B6 in Excel, enter the formula =AVERAGE(B2:B6) in cell B7. This will give you the average value for that range without needing absolute references.

Explanation:

To calculate the average value of cells B2:B6 in Excel and place the result in cell B7, you would need to enter the following formula: =AVERAGE(B2:B6).

This formula uses the AVERAGE function, which computes the mean of the numbers in a specified range by adding them together and then dividing by the count of the numbers.

It's important to note that, unlike the provided example using dollar signs ($), which indicates an absolute reference, the formula for B7 does not include these as it's not necessary for calculating the average within a fixed range.


Which research questions would be the most effective for researching the Ford Model T? Check all that apply.


A. How was the Ford Model T built?
B. What speed did the Ford Model T reach?
C. How did the Ford Model T change American society?
D. What were some challenges associated with owning a Ford Model T?
E. How much did the Ford Model T cost?

Answers

The research questions that would be the most effective for researching the Ford Model T are:

A. How was the Ford Model T built?

C. How did the Ford Model T change American society?

D. What were some challenges associated with owning a Ford Model T?

What are the research questions?

"A question that a research effort sets out to answer" is what is meant by a research question. Both quantitative and qualitative research requires a well-chosen study question.

Data gathering and analysis are necessary for the investigation, and there are many methodologies for doing so.

To write good research questions, follow these steps: focused and lucid To put it another way, the question should make it apparent what the writer must do. Neither too wide or too narrow.

Therefore, the correct options are A, C, and D.

To learn more about research questions, refer to the link:

https://brainly.com/question/25655057

#SPJ2

A patient asks her doctor to send a copy of her records to another medical office. However, the records are not transmitted because her doctor’s electronic patient database is malfunctioning. This type of security failure is called

Answers

 This type of security failure is called WIN32K_SECURITY_FAILURE.  This indicates a security failure was detected in win32k. According to a new report issued by Dark Reading, there are a number of key security failures that cybercriminals take advantage of.

it's interference or intrusion - the blockage of information intended to be transmitted or shared

Access control is more of a problem for wired lans than for wireless lans.
a. True
b. False

Answers

false

Media access control methods allow computers to transmit signals over a network cable. This only ensures that one PC transmits at a time. A collision can occur especially in wired networks if two PCs place signals simultaneously on the wire. Collision Avoidance which is a feature of the MAC layer is not feasible in wireless environments.  




Answer:B. FalseExplanation:

This answer is false because usually a wired LAN tends to be less problematic than a wireless LAN. Not only does a wired LAN provide better efficiency and security than wireless but also it usually tends to have lesser fluctuations. For example, a wireless LAN can have problems with its portable battery, the strength of its Wi-Fi signals, radio-electric signal discrepancy. None of these issues exist in a wired setup.

To annotate a document with a remark for another reviewer to address, select the _____ feature.

Answers

To annotate a document with a remark for another reviewer to address, select the Comments feature. 

In both Excel and Word, you can go to the toolbar and select review and you will see "New Comment." Select the word (in Microsoft Word) or the cell (in Microsoft Excel) add click on the "New Comment". 

If a wire has insulation that allows it to operate in a temperature of up to 194 degrees Fahrenheit, what temperature will the wire operate up to in degrees Celsius?

Answers

(194°F-32)×5/9
= 90°C
therefore the answer is 90degrees Celcius

Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

Answers

The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.

An example of a good electrical insulator is A. aluminum. B. iron. C. rubber. D. copper.

Answers

The answer to this is Rubber
A is the coorect answer HONEY!

Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.

a. âbinary line interface

b. âcommand line interface

c. âcharacter user interface

d. âgraphical user interface

Answers

D Graphical User interface

Which of the following components controls the opening and closing of the valves in an engine?

A. Crankshaft journals
B. Push rod
C. Rocker arms
D. Camshaft lobes

Answers

The camshaft lobes control the opening and closing of the valves in an engine.

Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does.

Answers

Header and footer elements such as worksheet name, current date, and time are dynamic elements, they change as your worksheet does. Because the information they contain ( page number, date,) changes that's why they are dynamic. Otherwise if the information was fixed, they would be static elements.

Header and footer elements like worksheet name, current date, and time are dynamic elements that change as your worksheet does. The Correct Answer Is Dynamic elements

In Excel, headers and footers can contain various data such as worksheet names, current dates, and times, which are all considered dynamic elements. These elements automatically update as your worksheet changes.

For example, if you insert the current date into a header, it will always display the actual current date whenever you open or print the worksheet.These features ensure that your document maintains accurate and up-to-date information, without manual updates each time.

The question "How is traffic affected by fans leaving the stadium?" is related to which of the following?

Answers

Final answer:

The question pertains to how traffic is affected by fans leaving a stadium, an issue related to Social Studies and urban planning at the college level. It delves into traffic congestion factors like road network design, public transportation, parking facilities, and city policies that need to be strategically managed to prevent negative impacts on the community.

Explanation:

The question "How is traffic affected by fans leaving the stadium?" relates to the subject of Social Studies, specifically within urban planning and the impact of large events on city infrastructure. This topic typically would be of interest at the college level, where students are exploring complex societal issues and how different factors interact within a community.

Factors influencing traffic congestion when fans leave a stadium can include the design and capacity of surrounding road networks, availability and management of public transportation, the efficiency of parking facilities, local policies regarding road use during events, and the behaviors of the attendees themselves. For example, if there are insufficient exit routes or inadequate public transport options, it could lead to significant congestion and traffic jams. Furthermore, such events may interfere with emergency vehicle access and have a negative impact on air pollution levels due to increased vehicular emissions. Hence, a comprehensive study and planning are crucial to mitigate these effects and ensure public safety and comfort.

Moreover, understanding these dynamics is essential for city officials and event planners to ensure that large events such as sporting events do not adversely affect the surrounding community. It also provides an opportunity to improve urban infrastructure and services while considering the environmental impacts and the well-being of residents.

Which activity cannot be done on a social networking site?
A.) self-promotion


B.) connecting with people


C.) organizing events


D.) blogging

Answers

the answer is blogging

Two small engine technicians are disassembling the engine shown in Figure A-9. After observing the engine components, both technicians say that this engine has a splash-type lubrication system. Technician A says that the engine uses a dipper that's attached to the connecting rod to splash oil from the crankcase onto its components. Technician B says that engine uses a slinger that's driven by the timing gears to splash oil onto its components. Which of the following statements is correct?

Answers

A splash-type lubrication system uses what the Technician A says :  that the engine uses a dipper that's attached to the connecting rod to splash oil from the crankcase onto its components. In  the  engine, dippers on the connecting-rod bearing caps enter the oil pan with each revolution to produce the oil splash.  A passage is drilled in each rod from the dipper to the bearing to ensure lubrication. 

"the firewall acts as a proxy for which two types of traffic? (choose two.)"

Answers

The question above has multiple choices as follows

a)      SSH

b)      Non-SSL

c)       SSL Inbound Inspection

d)      SSL Outbound

The answer is C and D


To enable the firewall act as a proxy for these two types of traffic, it has to perform an SSL forward proxy decryption. The Network admin has to set up certificates needed to establish the firewall as a trusted 3rd party to the session that exists between client and server. 

The firewall can use self-signed certificates to authenticate SSL session with the client.






Final answer:

A firewall acts as a proxy for HTTP and VPN traffic.

Explanation:

A firewall acts as a proxy for two types of traffic: HTTP and VPN.

HTTP traffic: When acting as a proxy for HTTP traffic, the firewall intercepts requests from clients and forwards them to the appropriate web server. It also receives the response from the web server and forwards it back to the client. This allows the firewall to inspect and filter web traffic, providing an extra layer of security.VPN traffic: When acting as a proxy for VPN traffic, the firewall receives encrypted data from VPN clients and decrypts it. Then, it forwards the decrypted data to its destination. Similarly, when data is received from the destination, the firewall encrypts it and sends it back to the VPN client. This allows the firewall to control and secure VPN connections.

Why should you run disk cleanup before running the optimize drives tool?

Answers

The answer to your question is that it free up space and stored in contiguous clusters when clean up only delete unneeded or unnecessary Fles 2. When you ran the Chkdsk command in this lab, it had to run during the startup process.

If you want to refine your Google search results by date, which option should you use?

Question 8 options:

News search

Simple search

Safe search

Advanced search

Answers

I believe you should use the Advanced Search option.
You would have to use advanced search

In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the group policies

Answers

regroup i think that is the answer

The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track when assignments are due. ways to prioritize tasks for a project. how many hours they can socialize. how many hours they can work on a project.

Answers

how many hours they can work on a project.

Answer: how many hours they can socialize

Explanation:

This list is in _____ order.
Zahn Smith
Mason Fitzpatrick
Billings
alphabetical
ascending
descending
incorrect

Answers

Descending.

Alphabetical order is from A-Z.
Ascending order is from A-Z.
Descending order is from Z-A.

Hope this helps!

The correct answer is C. Descending

Explanation:

In lists, the descending order implies the information is organized from the last to the first, in the case of numbers this occurs as the largest number is placed first and the smallest is last. Additionally, in the case of words, the descending order means to organize words from Z to A. This order differs from the ascending and alphabetical order that organizes words from A to Z. In the case presented, the descending order is used because the first element (Zah Smith) begins by Z which is the last letter in the alphabet, this is followed by Mason Fitzpatrick and finally by Billings considering M is before A in the descending order.

Given the code below, how many times would "I love C#" be output to the Console Window?
1
int counter = 10;
2
do {
3
Console.WriteLine("I love C#");
4
counter--;
5
}while (counter<5) ;
6
C#

0

1

10

11

Infinite Loop

Answers

The answer is 1.

Hope this helps

Lee only wants to print columns A-D of a spreadsheet he is working on. What sequence should he use to accomplish this? select cell A1, File, Print, Print Selection, Print Active sheets select A-D with his mouse, File, Print, Print Selection, Print Active sheets, Print select cell A1, File, Print, Print Active sheets, Print Selection select A-D with his mouse, File, Print, Print Active sheets, Print Selection, Print

Answers

select cell A1, File, Print, Print Selection, Print Active sheets select


Other Questions
Lucy has a strawberry lace that is 36cm long. She needs pieces 18mm long to decorate a cake. How long is the 36cm one in mm So These are science questions i need help im offering 60 points 1. What is the relationship between the Universe Galaxies, The solar systems and stars? (Make sure to describe each by size and what is in them)2. How do galaxys Form? (Make sure to say what force causes them to form)3. How does a stars temperature and mass affect the appearance of the star?(Make sure to discuss what the star looks like- color and brightness based on both temperature and mass) 1) What does "Me gusta la clase de ciencia naturales" mean in English?(1 points)I take science class.I like social studies class.I take social studies.I like science class.2)What is the name of the biggest university system in Honduras? (1 point)Universidad Nacional Autonoma de HondurasUniversidad Nacional Autonoma de Tegucigalpa Universidad en HondurasEsculas Autonomas de Tegucigalpa3) How would you say, "We need the calculator" in Spanish? (1 point)Necesito la calculadora.Necesitas la calculadora.Necesitamos la calculadora.Necesitan la calculadora. 1. Simplify using only positive exponents:(2t)2. Simplify using only positive exponents:(wj)(jj)3. Simplify using only positive exponents:abc----------abc4. Evaluate the expression for m = 2, t = -3, and z = 0.z(m)5. Use scientific notation to rewrite the number:a. 0.0002603 in scientific notationb. 5.38 102 in standard notation help me please please Jerry lost her credit card and instead of reporting it right away, she decides to continue looking for it for a couple of days. On the second day, she makes the call and reports the card lost/stolen to the credit card company. She then logs into the account activity page of his credit card and sees a recent $500 purchase that was made by someone else. How much of this $500 charge will Jerry have to pay? When the soviet union exploded an atomic bomb, the united states responded by intensifying efforts to develop _______? PLEASE HELP RIGHT NOW! 15pts Square RSTU is constructed with line PQ drawn through its center. If the square is dilated using a scale factor of one over two(1/2) and a line is drawn through the center of the new dilated figure, what relationship will the new line have with line PQ? Explain your reasoning using complete sentences. The nurse is caring for a client in labor. which assessment findings indicate to the nurse that the client is beginning the second stage of labor? select all that apply. Which culture formed the first state in mesoamerica? Viruses do not generate by chance. the programmer of a virus, known as a virus author, intentionally writes a virus program. writing a virus program usually requires significant programming skills. the virus author ensures the virus can ____ itself, conceal itself, monitor for certain events, and then deliver its payload. " -22< m-57 solve this pleasethankyouu Which of the following correctly explains the steps pictured below? An image depicting three stages of meiosis. The first shows two cells with chromosomes still paired as sister chromatids and spindle fibers beginning to form. The second pair of cells shows sister chromatid pairs lined up in the middle of the cell with spindle fibers attached to the centromeres of each pair. The third pair of cells shows the centromeres separating and individual chromosomes moving along the spindle fibers to opposite ends of the cell. Prophase II, Metaphase II, Anaphase II Prophase II, Anaphase II, Telophase II Prophase I, Prophase II, Metaphase I Prophase I, Metaphase I, Anaphase I A trip to the ocean can be a relaxing escape from the everyday pressures of life. A sailboat glistening on the horizon provides a mental escape to faraway places. The rhythm of the ocean beating against the sand is sedating music to a troubled mind. A slow, gentle breeze can relax your tensions. You should always be careful to avoid overexposure to the sun at the beach. a. Write the sentence that is the topic sentence of the paragraph. b. Write the sentence that is unrelated to the topic and can be eliminated. List four things to look for when youre proofreading. Complete the following two steps: a. Define the term clich. b. Use a clich in a sentence that you create. Name and explain two types of prewriting. Choose one of the prompts listed below. Write a five-sentence paragraph using chronological order and including a topic sentence to explain the steps that you would take to complete one of the following tasks. a. Preparing for a test b. Preparing to host a party or an event c. Getting ready for work d. Cleaning your room or your home e. Building a snowman, sandcastle, or sculpture f. Creating a budget Choose one of the following topics. Write an eight-sentence paragraph that fully develops the topic. a. Following instructions is very important.b. Job training programs (such as Job Corps) are valuable to both employers and potential employees. c. Advances in technology are making people less social. d. A high school diploma is important to my future. e. College is not for everyone. f. Drunk driving can be stopped. A triangle shaped papers height is 18 cm and width is 10 cm. Find the hypotenuse of the paper. Describe the straight line y=9 Which of these examples is an error of addition by one? A.46,371 + 32,618 = 78,989 B.38,273 + 51,425 = 89,798C.13,246 + 84,631 = 97,877D.52,634 + 25,145 = 77,779 What would you say were the advantages and disadvantages of nationalism? Kina is a 17-year-old woman. to discourage her from becoming deviant, her parents encouraged her to attend church, study hard, and believe that "nice girls finish first." kina's parents are also sociologists. kina's parents most likely subscribe to which theory of deviance? What is hospitality? What is one career in hospitality?