1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
2 years ago
15

Su wants to apply the new font to the other slides of the presentation. she knows she can use the format painter tool to do this

. how does she apply the new font using the paintbrush cursor? aside from using format painter, what other option or command can su use to complete her task?
Computers and Technology
1 answer:
storchak [24]2 years ago
4 0
Marian
This girl from our marina llama and an old saying go to the shop in new card and the baby and then I wore wow baby
You might be interested in
What is ana absolute adress
AleksAgata [21]

Answer:

The term <u>absolute</u> distinguishes it from a relative address, which indicates a location specifying a distance from another location. <u>Absolute addresses</u> are also called real addresses and machine addresses.

Explanation:

Sorry, I'm not so good at explaining things.. I hope I kinda gave you an idea on what it is though.

8 0
3 years ago
You have just been named Director of Data Administration of General Hardware Co. General Hardware maintains a large central IS o
Afina-wow [57]

Answer:

Since General Hardware has a "huge, central IS organization," this organization ought to incorporate the two data administration and database administration departments.

The data administration department will be required to deal with the full scope of data administration duties regarding the whole corporation, both at the central station and at the local offices.

The central database administration department will give the standard operational database administrations for the home office databases.

It will likewise give direction and coordination to the individuals at the provincial offices who are answerable for their databases.

Obviously, database administration will likewise be answerable for the daily data downloads alluded to.

Data administration and database administration will increase the value of the corporation by making arrangements for and overseeing data as a corporate asset with the objective of increasing an upper hand from it.

Explanation:

5 0
3 years ago
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
your teacher has accidentally put the wrong names of the students on her excel science results sheet. What method can be used to
Shtirlitz [24]

Answer:

Explanation:

Excel has a built-in function that allows you to type in a word, letter, or number and it will automatically find every one of that entry and replace it with whatever you want. To do this you simply click on Home > Find & Select > Replace and fill out the information. Once the info is completed click Replace All. This shows exactly why it is way better to do these result sheets on the computer as opposed to on a piece of paper, it allows you to automate everything and fix multiple mistakes with a simple button click.

6 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
nika2105 [10]

Answer:

The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. ... Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.

Explanation:

hope it helps!!

6 0
2 years ago
Other questions:
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • when reading a recipe ingredients witch substance make the rice an unhealthy choice if it is present in a high amount
    13·1 answer
  • What is FireWire?
    7·2 answers
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a
    6·1 answer
  • Pls help me!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • What is the key difference between a class and an object
    12·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
  • Since the size of cache is always smaller than the size of the main memory, the sum of bits of the offset and index of a cache w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!