The text that is heavier or darker than other text in a document is considered Bold.
Hope this helped!~
Answer:
Emboldened
Explanation:
Emboldening is a method of increasing the outline of the font of a particular text. It essentially creates a highlight of the text and makes it easily identifiable throughout the document. In Microsoft word, there are various ways to embolden a text:
1. To embolden a word or text, using the mouse, highlight or select the text and and using the keyboard, hold down the Ctrl key, while the Ctrl key is still depressed, press the "B" on the keyboard to make a text bold.
2. Select the text or word and on the home tab which is at the top of the word screen, click on the "B" icon, this will make the text bold.
3. Also the cursor of the mouse can be placed anywhere on the word to be made bold, after that right click on the word and click on the "B" icon, the word will be made bold.
Which of the following are the rows or columns of white space created between grids?
alleys
gutters
margins
thirds
The white space between the columns or rows in a grid are called gutters. Gutters provide separation for readability and aesthetics, while margins are the surround space around the entire document's content.
The rows or columns of white space created between grids are known as gutters. Gutters are the empty spaces that serve to separate columns, rows, or blocks of content. In contrast, margins refer to the white space surrounding the text on a page or the edges of a document, and they can be set to various sizes to affect the document's layout and readability.
While the term 'alley' is less common in design, it sometimes is used interchangeably with gutter, especially in newspaper layout. However, for standardized terminology, 'gutter' is the most widely accepted term for these white spaces between columns on grids.
Margins are important for the overall appearance of a page, as they define the printable area. Margins that are too narrow can make a page look crowded. Conversely, wider margins reduce the print area but can make a document look more open and easier to read.
15 points
Based on what happens in Alice's Adventures in Wonderland, which word best describes the author's attitude toward Alice?
A word that best describes the author's attitude toward Alice is sympathetic. Hope I could help! :D
Students can use eNotes to type notes directly on screen and
A. review or print them later.
B. post visual cues on their desktop.
C. clip text and images from websites.
D. store information to a back-up system.
Answer:
a i think sorry if im wrongExplanation:
Students can use eNotes to type notes directly on screen and store information to a back-up system.
What is Enotes?Brad Satoris and Alexander Bloomingdale created the free educational website eNotes in 1998. It offers resources to aid students in completing their homework assignments and preparing for tests. eNotes is a Seattle, Washington-based company that focuses on providing lesson plans, study materials, and literary analyses.
Although the business offers a wide range of topics in the humanities, the website's content primarily focuses on literature and history. The majority of the content is contributed by a network of more than 1,000 professors and teachers.
It differs from other paid online education providers in that uploaded works are primarily edited by an internal publishing team.
Therefore, Students can use eNotes to type notes directly on screen and store information to a back-up system.
To learn more about Enotes, refer to the link:
https://brainly.com/question/2114707
#SPJ3
What is the mathematical order of operations used in Excel when formulas are evaluated?
This order of operations states the order to be. A. exponentiation, multiplication and division, addition and subtraction.
Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that deactivates the alarm, and armed which contains a boolean describing whether or not the alarm is activated. Alarm has a function changeCode that takes two parameters containing Strings, the first representing the current code, and the second representing the new code. If the user inputs the current code correctly, the value of code is changed to that of the new code. Call the changeCode function on the Alarm object myAlarm, whose current code is "3456", and change the code to "7921".
it would be
myAlarm.changeCode("3456", "7921");
To change the code of the Alarm class, use the changeCode method by passing the correct current code and the new desired code.
For the instance myAlarm with the current code '3456', call myAlarm.changeCode('3456', '7921') to change the code to '7921'.
In programming, variables are placeholders in memory that can change their values. Here, we have a class Alarm with class variables code (a String) and armed (a boolean).
The changeCode method allows the code to be updated if the current code is inputted correctly. Assuming you have an instance of Alarm called myAlarm and its current code is "3456", you can change it to "7921" as follows:
class Alarm:After running this code, myAlarm.code will now be "7921".
__________ has the highest conviction rate of any vehicle-related offense.
A. Changing lanes without signaling
B. Failure to stop at a red light
C. Speeding
D. Parking at a red curb
Answer:
Speeding
Explanation:
Excessive speeding has the highest conviction rate of any vehicle-related offense. It is often said that "speed thrills but kills." This statement is true. A cautious driver should always check for speed signs and always play by the rules. Speeding will not only get you a ticket but also will cause fatal accidents or collisions that might lead to injury or death. Speeding offenses include fines, points reduction, or court hearing.
How many 4 GB movies could you store on a 500 GB hard drive?
125 movies and maybe some kb sized movies (depends on the amount of kb)
By what year had improvements in technology vastly improved the ability to stream videos online ? 1996 2006 2000 2012
2006
the year 2006 had the ability to lower costs and improve efficiency,
Improvements in technology drastically improved the ability to stream videos online in 2006.
Explanation:The year that improvements in technology vastly improved the ability to stream videos online was 2006. Prior to this year, there were limitations in bandwidth and internet connections, making it difficult to stream videos smoothly. However, with advancements in broadband internet and video compression techniques, streaming video became more accessible and widespread.
Learn more about Improvement in technology for video streaming here:
https://brainly.com/question/34531430
#SPJ2
What device is used to transmit what is effectively a type of Morse code between stations?
A. Modem
B. Fiber optic cable
C. Switch
D. Telephone
Answer:
its switch
Explanation:
that other person is wrong
A modem is the device used to transmit what is effectively a type of Morse code between stations.
Explanation:The device used to transmit what is effectively a type of Morse code between stations is a modem. A modem is a hardware device that converts digital signals from a computer into analog signals that can be transmitted over telephone lines, fiber optic cables, or other communication channels. It allows for the transmission of data between computers or devices using different communication protocols.
What is a component of a risk analysis that joins the potential risks with how those events might impact a business?
A. Risk assessment
B. Business continuity
C. Vulnerability assessment
D. Risk mitigation
The question states:
What is a component of a risk analysis that joins the potential risks with how those events might impact a business?
A. Risk assessment
B. Business continuity
C. Vulnerability assessment
D. Risk mitigation
Answer: B. Business Continuity
Explanation: The component of a risk analysis that joins the potential risks with how those events might impact a business is Business Continuity. Business Continuity is the process of creating a plan to ensure that a business can continue to operate in the case of an unexpected disruption. A Business Continuity plan includes a risk assessment to identify potential risks and a strategy to mitigate those risks. It also includes procedures for responding to and recovering from events that could disrupt normal business operations. Therefore, option B, Business Continuity, is the correct answer.
Final answer:
A Risk Assessment is the process that joins potential risks with their possible impact on a business, involving the identification, analysis, and prioritization of these risks.
Explanation:
A component of a risk analysis that joins the potential risks with how those events might impact a business is known as a Risk Assessment. This process involves identifying hazards, determining exposure, and calculating the probability of these risks occurring under specific conditions.
A crucial aspect of risk assessment is to weigh different scenarios and estimate the probabilities of different outcomes. The main goal in risk assessment is to anticipate potential incidents and to determine how to minimize or manage their impact on the organization effectively.
This is achieved through a process that includes identification, evaluation, and prioritization of potential risks.
How do they make the "chips" in computers?
This is done using an optical process, not unlike how old photos were printed. A silicon wafer is covered with some etching resisting material, and then exposed to UV light through a mask. The mask is a drawing of the chip schematic.
The etching resisting material is removed where the light hits (or vice versa), and parts of the silicon wafer is etched away with a chemical. Different layers can be deposited by repeating this process.
Finally the wafer is cut into little rectangles and placed inside a housing.
How does modularity provide flexibility in a structured programming design?
Modularity enables multiple programmers to work on a program at the same time
Modularity enables a linear approach to software development
Modularity ensures the reuse of code variables.
Modularity ensures that a program will be completed on time.
Modular programming is the process of subdividing a computer program into separate sub-programs. Modularity provides flexibility in a structured programming design the following way: Modularity enables multiple programmers to work on a program at the same time. Correct answer: A
It provides developers flexibility in module maintenance.This makes the program easier to read and understand.
Answer:
A
Explanation:
Got it right on Edge 2021
What is the outcome when you select a section of unformatted text and click the Bold option, then the Italic option, then the Underline option? A. The resulting section of text will remain unchanged because this works only for individual words. B. The resulting section of text will only have the last formatting (underline). C. The resulting section of text will be bold, italic, and underlined. D. The resulting section of text will remain unformatted because you cannot use more than one formatting style. E. The resulting section of text will be bold and the program will ignore all other styling after that. Reset Next
I believe the answer is C
Answer:
c
Explanation:
An automated search feature used by search engines to find that match your search terms is called a spider or
Answer
Crawler
Explanation
This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.
what is scratch in information system .
Scratch is a visual programming dialect and online network focused on essentially at youngsters, by coding with squares in the manager. Clients of the webpage can make online undertakings utilizing a square like interface. Scratch is a genuine programming language in its own right. Scratch is written in squeak, an open source execution of smalltalk-80 dialect.
Which design approach help build sites that optimize varied screen sizes
Adaptive design approach
Adaptive design approach offers multiple fixed layout sizes. As compared to the responsive design, adaptive design delivers separate content to users based on their specific device. Responsive design approach uses fluid grids and offers the same website across every device. On the other hand, in adaptive design, the site chooses the best layout for that screen. You can develop 6 designs for the 6 most common screen widths.
In what two ways can you measure hard drive speed? Explain each of these measurements.
u can measure it in GB, MB, and TB. which is mainly in measuring it by storage
Give three reasons why Black hats hack?
Answer:
Explanation:
In bo2 they can hack scorestreaks!
Flinstonia has a real GDP of $100,000, and Bedrockton has a real GDP of $100,000,000. Which country has the higher standard of living?
Bedrockton because the higher the GDP the higher the living standard.
What are at least three tips to taking photographs of insects? Why would following the tips help create better photographs?
1) Use a good cam 2) Make sure you focus on it 3) Make sure you snap it at the right time.... I hope this helps!!!!!
[tex]4875 - 4859[/tex]
answer : 16
4875 - 4859 = 16
Andrew is using a word processing application to type out his résumé. Which of the following change happens "on the fly" as he types?
A.
it changes the font size to a more readable one
B.
it highlights grammatically incorrect sentences
C.
it creates line breaks wherever required
D.
it automatically selects easily readable fonts such as Arial
Andrew is using a word processing application to type out his résumé. Which of the following change happens "on the fly" as he types?
A.
it changes the font size to a more readable one
B.
it highlights grammatically incorrect sentences
C.
it creates line breaks wherever required
D.
it automatically selects easily readable fonts such as Arial
On the fly refers to something that is being changed while a process is still ongoing.
In a word processing application, what is more likely to happen is (B) it highlights grammatically incorrect sentences. This would occur since Microsoft Word default settings would be to do this. The other options would not occur automatically; the user needs to intentionally pick to do them.
A/an is a mathematical state that calculates a value
A formula is a mathematical state that calculates a value.
It is a special equation that shows the relationship between various variables. It is used to express mathematical relationships and rules, symbolically and concisely, and offers a solution to a problem. An example of a formula is one that expresses the volume of a box or the circumference of a circle.
what are the two reasons you might decide to flash bios
Two reasons you might decide to flash BIOS are:
-The system hangs at odd times or during the boot.
-Some motherboard functions have stopped working or are giving problems. For example, the onboard video port is not working.
Enter a formula or in sales G5 the calculate the difference between the attendance totals for 2018 and 2017
we will write year in column B and column c respectively
2017 and 2018
then we will add months of year from January to December in the cells range from A2 to A13
then we will choose cell g5 and will write the diffrence formula
g5=attendance of 2018 - attendance of 2017"
we put "=" sign to put an formula in excel
then finally we will use fill handle and drag it from g6 to g12
to copy the difference formula
look at attached file
What are the most important advantages of using the insert chart tool in word and importing data from Microsoft excel
I am not sure but I think that it is the third answer
How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple___ engineering.
The answer might be social
Answer:
simple social engineering
Explanation:
social engineering as regards to information security and not social science. is the act of deceiving people into performing/practicing unconventional activities on the information network that will get their personal data exposed.
This psychological manipulation of people on the network into performing unconventional activities that will get their personal data exposed is mostly performed by hackers. the aim of this is to perform fraudulent or malicious activities using their personal data either on them or on unsuspecting individuals.
A hacker is someone who tries to break in a computers defense system by exploring ways around it instead of seeking permission to have access into the system.
can anyone answer this picture?
This program multiplies integer inputs A and B, by repeatedly adding B to RESULT while decrementing A.
It will work fine when either A or B is zero. If A is zero, it will branch to QUIT immediately. If B is zero, zero will be added repeatedly to the result (which also is initialized with zero).
LOOP, RESULT etc. are called labels. They translate into a memory address location of a variable or machine instruction. But it is much more readable to have them as english words while creating your program. Also, they make your program relocatable, in the sense that while writing, you don't have to decide on which physical address your program will run.
Tina is making a resume for the first time. What should her heading section include?
A. Her skill set B. Her name and contact information C. Her career objectives D. The word “Résumé”
Name and contact information
Which of the following likely has the highest degr
A. A biomedical researcher
B. A social worker
C. A registered nurse
D. A cosmetologist
the following likely has the highest degr is A registered nurse
So your answer is C. A registered nurse
Answer:
your answer is A
Explanation:
Im a 99% sure