You have typed the characters 3rd. Which of the following formatting features should be used to format the 'rd'?

1. superscript
2. Highlight
3. Sub script
4. Italics

Answers

Answer 1

Answer:

1. Superscript

3rd written as 3ʳᵈ

Explanation:

A superscript is a number, figure, symbol, or indicator that is smaller than the normal line of type and is set slightly above it.

Select the text or number you want.

Steps to apply superscript

1. Select the text or number you want

2. Go to Home and select Superscript X²

3rd written as 3ʳᵈ

The same rule applies to

9th written as 9ᵗʰ


Related Questions

The different between a compiler and a translaror

Answers

Answer:

Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.

Answer:

Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.

Explanation:

cloud services are the ideal backup option for user files. which of these is not one of today's popular cloud storage platforms?

Answers

Cloud infrastructure as a service, Cloud data storage as a service, Cloud platform as a service and Cloud software as a service are not one of today's popular cloud storage platforms. Hence, option E is correct.

What is Cloud infrastructure?

The cloud computing infrastructure is the collection of hardware and software needed to enable cloud computing. It includes a user interface as well as storage, networking, and computing power so that users may access their virtualized resources.

Examples include serverless operations, service fabrics, and managed network services including application delivery controllers, load balancers, firewalls, and domain name services.

Thus, option E is correct.

For more information about Cloud infrastructure, click here:

https://brainly.com/question/13468612

#SPJ1

The options are missing-

a. Cloud infrastructure as a service

b. Cloud data storage as a service

c. Cloud platform as a service

d. Cloud software as a service

e. All of the above are services of cloud computing.

which of the following explains why gives directions to a location for creating an algorithm

A.An algorithm provides step-by-step instructions

B.An algorithm is written in a computer code

C. An algorithm gives different steps each time it is used

D.An algorithm posts directions on a website.​

Answers

I am pretty sure it is D but if not I’m sorry
Iehennsjdjejejrndnndmekrndnxbshje D

What does your car driver look like? Answer the following question.

1. How many minutes do you drive every day?

2. How long do you travel every day?

3. What trips could you make in any other way?

4. What are the risks / dangers of traveling by car?

Answers

Answer:

42 miami to pakistan

Explanation: buy

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

How does infringement of a cybersecurity law affect those
infringed upon and those infringing?

Answers

Cybersecurity is an ever-growing concern, and cybersecurity laws are becoming more important as a result. These laws protect the digital world from hacking, viruses, identity theft, and other forms of cybercrime. Infringement of a cybersecurity law can have an impact on both the infringer and the infringed upon.

Infringing upon a cybersecurity law can lead to criminal charges and substantial financial penalties. The severity of the consequences will vary depending on the type of infringement, the severity of the harm caused, and whether the infringement was intentional or not. The infringer may face not only financial penalties, but also a loss of reputation and trust, legal action, and even imprisonment. These consequences may have long-term negative effects on the infringer's future prospects. The infringed upon may suffer from data breaches, loss of personal information, identity theft, and other cybercrimes. As a result of cybercrime, individuals can lose their reputation and livelihood, as well as their financial savings. Furthermore, the infringed-upon may face the difficult and expensive task of restoring and protecting their digital data, as well as their online identity. Victims of cybercrime may be able to claim compensation, but the process can be lengthy, difficult, and expensive.

In conclusion, infringement of a cybersecurity law has serious consequences for both the infringer and the infringed-upon. It is crucial to take cybersecurity measures and comply with cybersecurity laws to protect oneself and others in the digital world.

To know more about cybersecurity visit:

https://brainly.com/question/30902483

#SPJ11

Teens are more likely to access the news online or by watching the news on TV.
OA. True
OB. False

Answers

The answer is True.

Cache hit occurs when requested data is found in cache. For cache hit, data in main memory is loaded again to cache.

Answers

Answer:

 TRUE

Explanation:

In the field of computing, cache is defined as the software or hardware component which stores the data and information for future use. It is a place in the computer software or hardware where the data are stored for their future use so that it can be retrieved faster when the data or the information is requested by the user.

A cache hit occurs when the data that is requested by the user is found in the cache memory. It is meant to deliver the data faster to the processor. And for the cache hit, the data in the memory is again loaded in the cache when the data is used.

Which network device sends data to every device that is connected to it?.

Answers

Answer:

Router

Explanation:

A router is a more complex device that usually includes the capability of hubs, bridges and switches. A hub broadcasts data to all devices on a network. This can use a lot of bandwidth as it results in unnecessary data being sent - not all computers might need to receive the data.

", how much fragmentation would you expect to occur using paging. what type of fragmentation is it?

Answers

In terms of fragmentation, paging is known to produce internal fragmentation. This is because the page size is typically fixed, and not all allocated memory within a page may be utilized. As a result, there may be unused space within a page, leading to internal fragmentation.



The amount of fragmentation that can occur with paging will depend on the specific memory allocation patterns of the program. If the program allocates memory in small, varying sizes, there may be a higher degree of fragmentation as smaller portions of pages are used. On the other hand, if the program allocates memory in larger, consistent sizes, there may be less fragmentation.

Overall, paging can still be an effective method of memory management despite the potential for internal fragmentation. This is because it allows for efficient use of physical memory by only loading necessary pages into memory and swapping out others as needed.

To know more about memory allocation visit:

https://brainly.com/question/30055246

#SPJ11

uses a device's gps to define geographical boundaries where an app can be used. Function of what is this?

Answers

The function you are describing is called "Geofencing." Geofencing is a location-based service that uses a device's GPS or other location services to define geographical boundaries where an app can be used.

The boundaries can be set up as virtual perimeters around a specific geographic area, such as a building, a city block, or a specific location.

When a user with the app installed on their device enters or exits the defined area, the app can trigger a specific action or send a notification to the user. For example, a retail store can use geofencing to send targeted advertisements or promotions to customers when they enter the store or a specific department. Similarly, a transportation company can use geofencing to track the location of their vehicles and send alerts to customers when the vehicle is approaching their pickup location.

Geofencing can also be used for security purposes. For example, an organization can set up geofencing around a secure facility or a restricted area, and if an unauthorized person enters the area, the security team can be alerted immediately.

learn more about  GPS    here:

https://brainly.com/question/30821063

#SPJ11

Ayy so in your opinion what is they best XXL freestyle no wrong answers except for Coi Leray and YK Osiris, my personally favorite is Denzel Curry's.

Answers

I’m not shure ……………..

What does FLUX do when soldering an electrical joint?

Answers

Answer:

Flux is an acidic blend that makes a difference evacuate oxides from the range of the joint and so makes a difference the patch stream effectively over the joint and frame a great bond. The flux can be seen as a brown fluid as a patch is warmed, and it in some cases gives off a impactful smoke that can act as a aggravation.

Explanation:

flux prevents oxidation of the base and filler materials. while soldering the metals, flux is used as threefold purpose, as it removes the oxidised metal from this surface to be soldered.

Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts of the college's intranet.

What type of network is Jennifer using?

Answers

Answer:

Extranet!

Explanation:

According to the Dictionary, an Extranet is an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely! I also got it correct in a test i did :]

Hope this helps :]

Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?

A frames
B. characters
C. key frames
D. movement

Answers

i think the answer is c

a(n) _____ is the smallest element of light or color on a device displaying images.

Answers

A pixel is the smallest element of light or color on a device displaying images.

Pixel short for "picture element," are the basic building blocks of digital images, combining to form a complete picture that represents visual data captured or generated by various devices, such as cameras, computers, or smartphones. In a digital image, each pixel has a specific color value, which is determined by a combination of red, green, and blue (RGB) intensities.

The color depth, or the number of colors a device can display, is based on the number of bits used to represent the color of each pixel. A higher bit depth allows for a greater range of colors, providing a more accurate and detailed image representation. The resolution of an image or display device is defined by the number of pixels in the horizontal and vertical dimensions. The more pixels within a given area, the higher the resolution and the greater the image detail. This is often measured in terms of pixels per inch (PPI) or dots per inch (DPI).

Pixels play a crucial role in various display technologies, including LCD, LED, and OLED screens. These devices consist of an array of individual pixels, which are activated and controlled to display the desired image. As technology advances, devices are capable of displaying images with increasing pixel densities, allowing for higher resolutions and sharper, more vibrant images.

know more about Pixel here:

https://brainly.com/question/30241619

#SPJ11

A scatter plot can be used with both numerical and non numerical values. True or False?

Answers

Answer:

true

Explanation:

After you set a goal or purpose for your Web site, what is the next step to designing your​ pages​?

Answers

The next step to designing your pages after setting a goal or purpose for your website is to determine the target audience for your website.

Once the target audience has been determined, the designer can then begin to create the overall layout and design of the website, selecting appropriate colors, fonts, and images to create a visually appealing and easy-to-use interface. It's also important to consider the navigation structure and content organization to ensure that visitors can easily find what they are looking for.

You can learn more about easy-to-use interface at

https://brainly.com/question/20340641

#SPJ11


Which of the following statements does not explain the difference between safety stock
Inventory and the cross docking method?

Answers

The statements does not explain the difference is that Cross-docking reduces inventory and storage space requirements, but handling costs and lead times tend to increase.

What is the difference between safety stock inventory and the cross-docking method?

safety stock inventory is known to be a kind of traditional warehousing systems that needs  a distributor to have stocks of product already at hand to ship to their customers.

But  a cross-docking system is one that is based on using the new and best input such as technology and business systems to produce a JIT (just-in-time) shipping method.

Learn more about safety stock Inventory from

https://brainly.com/question/18914985

physical strength to lift heavy equipment and machinery

what carrer is this
1 radio
2 god
3car spiliest
4 radoioligest

Answers

The answer to this problem is 4. “Radiologist” physical strength is needed to lift heavy equipment and machinery

what are the major steps in the software development process? cse 460

Answers

The major steps in the software development process are planning, designing, testing and implementing.

Needs identification: Needs identification is a market research and brainstorming stage of the process. Before a firm builds software, it needs to perform extensive market research to determine the product's viability.

Requirement analysis: Requirement analysis is the second phase in the software development life cycle. Here, stakeholders agree on the technical and user requirements and specifications of the proposed product to achieve its goals.

Design: Design is the third stage of the software development process. Here, architects and developers draw up advanced technical specifications they need to create the software to requirements.

Development and implementation: The next stage is the development and implementation of the design parameters. Developers code based on the product specifications and requirements agreed upon in the previous stages.

Testing: The testing phase checks the software for bugs and verifies its performance before delivery to users. In this stage, expert testers verify the product's functions to make sure it performs according to the requirements analysis document.

Deployment and maintenance: Once the software is defect-free, the developers can deliver it to customers. After the release of a software's production version, the IT software development company creates a maintenance team to manage issues clients encounter while using the product.

Therefore, the major steps in the software development process are planning, designing, testing and implementing.

Learn more about the software development process here:

https://brainly.com/question/20369682.

#SPJ4

Let’s say I have a variable with a value of 18.Write the code for changing its value to 19.

Answers

Answer:

a variable which always takes integer values, can be declared as type int in Java. For example the line of code.

Explanation:

If you have a variable with a value of 18. If you want to change it, to 19. Right-click on the variable whose value you want to change and select change value.

What is coding?

Coding, often known as computer programming, is the way we speak to computers. Coding is similar to writing a set of instructions because it instructs a machine on what to do.

You can instruct computers what to do or how to behave much more quickly by learning to write code. In Java, a variable that only accepts integer values can be specified as type int. Take the code line as an example.

Values coding is a coding technique that explores the ephemeral quality of the human experience.

Therefore, if your variable has a value of 18, then. Change value can be chosen by right-clicking the variable whose value you wish to modify.

To learn more about coding, refer to the link:

https://brainly.com/question/2094784

#SPJ2

The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence process include _____________, _______________, and _______________.

Answers

The people, procedures, etc. needed to create computer systems that can simulate human intelligence process include learning, reasoning, and self-correction .

What is artificial intelligence system?

This is known to be a type of system that is made use of people, procedures, hardware, software, etc. to create a type of computer systems and machines.

Conclusively, Know that they  often influence human intelligence processes, by  in the area of learning (the getting of information and methods for using the information), reasoning (thorough the use of laws or rules to come to a conclusion), and self-correction (through the use of different occurrences or outcome from one event to boast its performance on future times).

Learn more about  human intelligence from

https://brainly.com/question/9786721

Imagine that you and four friends are setting up a website for a new business that you are launching. Your business will provide a food truck for large events. Two of your friends want to use a personal server and two want to use a server provider. Which group would you agree with and why?

Answers

Given that it's a new business, I would agree with the group that wants to go with Server Provider. See the explanation below.

What are the benefits of going with a Server provider?

Hosting one's website personally can be quite expensive. Think of this in terms of:

Actual Financial Cost of Acquiring the relevant equipment. To keep up with the growth of the business, you will need to incur the cost of depreciation and maintenance as well.

Cost of Possible liability due to loss of data:
Should anything happen to the data of your clients, the cost may be too much to bear.

Shared hosting on the other hand has the following advantages:

It is less costly. It's adaptable.It's simple to self-manage.You have the option of hosting numerous domains.It's professionally run.It is capable of hosting dynamic web pages.Advanced Database ManagementEnhanced security.

Hence, I'd go with Server Provider.

Learn more about server provider:
https://brainly.com/question/14302227
#SPJ1

When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called

Answers

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

The process When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

What is the Lightweight Directory Access Protocol?

An open, supplier conditioning and reinforcement for providing distributed directories technology solutions over an IP network are called the Lightweight Directory Access Protocol.

By enabling the sharing of data about people, systems, networks, services, and applications throughout the network, directory services play a crucial role in the development of intranet and Internet applications.

LDAP is frequently used to offer a central location to store users and passwords. As a result, several software programs and services can connect to the LDAP server to verify users.

The interaction When LDAP traffic is made secure by utilizing a Secure Attachments Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

More about the Lightweight Directory Access Protocol link is given below.

https://brainly.com/question/28364755

#SPJ12

12. What is the purpose of an outline?
(1 point)
A.to present the essay in a different way
B. to analyze the story's narration
C. to make it easier for publishers to develop a table of contents
D.to organize notes and make a plan for writing

Answers

I believe the answer is D.

What is a PivotTable?

Answers

You use it to analyze numerical data

Answer:

A PivotTable is a tool in a spreadsheet program, such as Microsoft Excel, that allows you to organize and summarize large amounts of data. PivotTables allow you to quickly create reports and view your data from different perspectives. You can use PivotTables to create calculations, compare data, and find trends and patterns. PivotTables are a useful tool for data analysis and can help you make better decisions based on your data.

Why is the list constructor commonly used to find an index of an array element? Select an answer: .
a. index returns the array value for a particular index.
b. The array must be stripped of redundant information.
c. Arrays are not ordered. .
d. index only works with lists.

Answers

The list constructor is commonly used to find an index of an array element because it is a data structure that is an ordered sequence of items in Python programming.

This implies that the elements are arranged in a specific order and can be accessed using an index, and a list in Python is simply a collection of items that are separated by commas, with the whole list being surrounded by square brackets ([ ]).

Moreover, lists are mutable, which means that they can be modified after they have been created by adding, deleting, or modifying elements in the list.

In addition, the indexing of list elements begins at 0, which means that the first element in the list has an index of 0, the second has an index of 1, and so on. This makes it easy to find the index of a specific element in a list using the list constructor and the index() method, which returns the index of the first occurrence of the specified element in the list.If the element is not present in the list, it raises a ValueError. For instance, given a list

L = [10, 20, 30, 40, 50],

To know more about constructor visit:

https://brainly.com/question/13267120

#SPJ11

System used to setup the computer’s hardware

Answers

Answer:

operating system is used to setup the computers hardware

the speed of cpu is measured in terms of what?

Answers

Answer:

Megahertz (MHz) or Gigahertz (GHz)

1 GHz = 1000 MHz

Other Questions
The guidance department has reported that of the senior class 2. 3% are members of key club 8. 6% are enrolled in AP physics and 1. 9% are in both three times four and four fifths Determine whether the triangle with the given side length is acute, right, obtuse, or not a triangle. A. 3, 9, 10 B. 6, 12, 19C. 21, 28, 35 D. 21, 28, 35Please help me! I'll really appreciate it. (: Hello guys I need help. Does software developer require selenium and django? Can I work as software developer using python only? What are 3 barriers that East Asians face when going to the doctor that may delay medical treatment Book is called Black BoyDue Apr 5, 12:40 PIn chapter 8 Richard Wright graduates top of his class from Junior High School. This is his last year of formaleducation, education. He refuses to deliver the prepared graduation speech that his principal wants him to giveInstead he gives his own speechRichard's speech, however, is not included in the book. Here is what I want you to doWrite the graduation (=valedictorian) speech Richard might have given. So you need to put yourself in Richard's shoes(I=Richard).Length: 5 paragraphs-introduction, 3 body paragraphs (past, present, future), conclusionFor your body paragraphs include what you have learned about Richard so far:Pastwhat obstacles has Richard had to overcome to get to this point?Present: what is Richard up to right now?Future: where does Richard see himself in the future? How does he see society develop in terms of race relations?Below find the features of a graduation speech:Introduction: Addresses audience, includes an attention grabber; emphasizing the honor of giving the speech.Body paragraphs: usually 3 part emphasis on past, present, future. Fill in the blanks with the correct present tense forms of the verbs in parentheses.(part 2)Durante el da (1)_______ (pasar) tiempo con mis amigos. Por la tarde ellos (2)_______(practicar) deportes pero yo no. Soy miembro de una banda musical con mi hermano. l (3)________(tocar) la guitarra y yo (4)_______(cantar). Nosotros (5)________(practicar) todos los das despus de la clases. How did many artists and writers of the time describe the 1920s? * What is the major difference between Bromus erectus (graph f) and the other plant species (graphs a-d) included in the study Explain whether a triangle exists with side lengths 31 m, 89 m, and 122 m. Click this link to view O*NETs Education section for Stationary Engineers. According to O*NET, what is the most common level of education that Stationary Engineers have? high school diploma or equivalentsome college, no degreeassociate degreebachelors degree el burro de clero tiene una altura de 3 pies con 5 pulgadas . si cada pie equivale a 30.48cm y cada pulgada 2.54 cm cuanto mide la altura del burro clero What caused japan to end over 200 years of seclusion. 76mm=m what' s the answer what if someone destroys your project what will you do What is one major advantage of setting up a business as a corporation?O A. Corporations can be started easily and at a lower initial cost.B. Corporations are able to raise large amounts of capital.C. Corporations are subject to fewer regulations than otherbusinesses.D. Corporations give their founders full freedom to make decisions. Point K lies at (-3,4). Point K is reflected over the y-axis and then translated 7 units down to produce K. Which rule could have been used to produce K from K? A runner can finish 3 miles in 24 minutes. If they can maintain that pace, how far could they run in 40 minutes? Identify this reactionC5H12 + O2 ---> CO2 + H20A. Synthesis B. Combustion C. Single DisplacementD. Double Displacement 4. Particles in which state of matter are the most likely to interact with each other to cause a chemical reaction?A. GasB. Liquid C. Solution D. Solid2. Identify this reactionC + S8 ---> CS2A. Synthesis B. Combustion C. Single DisplacementD. Double Displacement 3. Identify this reactionAl + S2 ---> Al2S3A. Synthesis B. Combustion C. Single DisplacementD. Double Displacement PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! In 60-80 words:In "A Poison Tree," Blake maintains that restraining anger, rather than preventing cruelty and aggression, gives extra energy to aggressionand strengthens cruelty. Do you agree-is it better to tell other people how you feel when you are upset with them or have a difference of opinion, or should you keep it to yourself and try to be accommodating?