1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
3 years ago
15

Creating a wedding website on the knot- how to make the text wide

Computers and Technology
1 answer:
Nady [450]3 years ago
3 0

Answer:

go to the side with you mouse drag it ove or the restoere down button at the top right in between the - and the x hope this haelp may you mark me as brainlyest pls and thank you have a  bless day <3

Explanation:

You might be interested in
All margins of a report are _____ inch. *<br><br> 1<br> 2<br> 3<br> 4
MA_775_DIABLO [31]

Answer:

The answer is "1 inch"

Explanation:

The margin is also known as space, it is the distance between the document 's text and edge. In default, its distance is 1, and it also allows you to customize, the new document, which is set to standard.

  • In other words, we can say that it implies the one-inch gap between the text and each edge, which is based on your specifications.
  • It also allows you to customize the margin size of the document, and other choices were wrong because it is the customize size.

6 0
3 years ago
Apart from the challenges of heterogeneity, business and social change and trust and security, identify other problems and chall
Klio2033 [76]

Answer:

The challenge of cost control

The challenge of competence

The challenge of reduced system delivery times.

Explanation:The Challenge of Cost control is a major challenge affecting the software engineering in the 21st century,the cost of Microchips and other hardware are constantly rising.

The challenge of competence is another major challenge affecting software engineering in the 21st century,as most software engineers lack the required competence to handle some of the issues facing softwares.

The challenge of reduced system delivery times is a major challenge likely to affect software engineering in the 21st century,as people required the software to be available in the shortest possible time.

7 0
3 years ago
What kind of music is liked the most by people
Varvara68 [4.7K]
A . Pop
D . K-popp I guess
6 0
4 years ago
Read 2 more answers
I just wanted to know what are some of the challenges that could arise from setting up a file management system on a computer
ArbitrLikvidat [17]
There is always a risk of you losing files and then you may have to pay for it depending on what services you use.

7 0
4 years ago
Read 2 more answers
Describe the concept of a cursor and how it is used in embedded SQL.
Korvikt [17]

Answer:

Cursor is the temporary area created when the SQL statement is executed.

Explanation:

Data base management system allows

 Entering Data

 Housekeeping

 Querying data

 Printing reports

Cursor contains the information about the selected statement and the rows data accessed by it. This space is used to store the data retrieve from data base    

A cursor is used to get rows from the query that has many rows in its result sets a cursor is work as a handle and identifier in SQL query. it is very necessary in SQL because it is an object which is used to store the output of query.

A cursor is used to retrieve rows from a query that has multiple rows in its result set. A cursor is a handle or an identifier for the SQL query and a position within the result set.  

7 0
4 years ago
Other questions:
  • Todd, a travel agent, lost his job due to no need for his skill. This is an example of what type of unemployment?
    12·1 answer
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • _________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
    9·1 answer
  • • &gt; Four 240-pin DDR3 SDRAM DIMM sockets arranged in two channels • &gt; Support for DDR3 1600+ MHz, DDR3 1333 MHz, and DDR3
    14·1 answer
  • You do not really know that you have a hand. Here is why. Imagine the possibility in which you are only a handless brain floatin
    14·1 answer
  • What applications would you pin to your taskbar, why?
    15·1 answer
  • According to the amendment, the federal government has only those powers specified by the Constitution. These powers include the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!