1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
2 years ago
11

Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.

Computers and Technology
1 answer:
dusya [7]2 years ago
5 0

Word wrap is the same as; Soft Return

Word wrap means that you let the; Computer Control when it will go to a new line

<h3>What is Text Wrapping?</h3>

Text wrapping is simply defined as a process used in MS Word to Wrap a Text around an Image.

Now, the way it is done is by selecting the image you want to wrap text around and then On the Format tab, click the Wrap Text command in the Arrange group, then select the desired text wrapping option to wrap the text.

Finally Word wrap is also same as using soft return and letting the computer control when it goes to the next line.

Read more about text wrapping at; brainly.com/question/5625271

You might be interested in
You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
Ray Of Light [21]

Answer:

This IP address is assigned to the interface by the following device:

d. The local computer

Explanation:

  • Ipconfig command is also known as Internet protocol configuration command. It is command line tool that is used to configure the IP of network connections. This command give us information about the information about IP and other parameters like default gateways.
  • The IP address 169.254.X.X is such IP address that can have values from 169.254.0.1 to 169.254.254.
  • 169.254.X.X is a Automatic Private IP Address that tells that our computer is not connected with the internet because the computer is not getting IP address from server.
5 0
4 years ago
(2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
elena-s [515]

Answer:

Pseudocode is explained below

Explanation:

# Create a variable to count the numbers.

numberOfNumbers = 0

# Create a variable to store the sum of numbers.

sumOfNumbers = 0

# Create a constant to store the special numbers.

constant specialNumber = 222

# Start the loop.

while True:

{

   # Prompt the user to enter a number.

   num = input("Enter a number: ")

   # Break the loop if the number is

   # equal to the special number.

   if num == 222:

   {    

       break

   }

   

   # Otherwise, add the number in the current

   # sum and increment the number of values.

   else:

   {

       sumOfNumbers = sumOfNumbers + num

       numberOfNumbers = numberOfNumbers + 1

   }

}

# Display the values.

print("The number of numbers = ", numberOfNumbers)

print("The sum of numbers = ", sumOfNumbers)

7 0
3 years ago
What is the definition of Microsoft Operating System?<br>​
MaRussiya [10]

Answer:

Operating system designed and produced by Microsoft Corporation. Similar to other operating systems, Windows makes a computer system user-friendly by providing a graphical display and organizing information so that it can be easily accessed.

Explanation:

6 0
4 years ago
Read 2 more answers
MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
ryzh [129]

Answer:

128 bits

Explanation:

The MD5, which is the acronym for Message-Digest algorithm 5, invented by a professor of MIT, Ronald Rivest, is a cryptographic hash algorithm that creates a 128 bit hash value and is typically represented as a 32 character hex number. MD5 is the improved version of MD4 which was also created by the same professor.

Following is an example format of an MD5 hash;

<em>ef55d3a698d289f2afd663725127bccc</em>

MD5 has been proven to have security issues. One of these issues is called collision attack - a situation where the same hash is produced for different input data.

8 0
4 years ago
A computer physical parts are called
JulsSmile [24]
Computer hardware is what its called
7 0
3 years ago
Other questions:
  • The collodion process was significantly more expensive than the cost of a daguerreotype
    10·1 answer
  • Carlos wrote a check for $44.92 to pay his gas bill. He’ll use the check register to record his transaction. What will be his ne
    10·1 answer
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • Which button would you use to quickly add addresses to a mail merge envelope?
    5·1 answer
  • If you have two pennies, the probability of both coming up heads when flipped
    13·2 answers
  • In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.
    12·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Plz I need the answer!!!:(
    11·1 answer
  • Discuss any five factors that hinder the application of a computer in business organisations​
    15·2 answers
  • John's father specifically asked him to get a magnetic disk from the store in his neighborhood. What should John buy?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!