1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
5

Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change

the color of the text?
A. Text box
B. Line color
C. Font color
D. Fill color
Computers and Technology
1 answer:
SashulF [63]3 years ago
7 0

Front color c because your changing the color of the text not the box line or fill

You might be interested in
True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
Gekata [30.6K]

Answer:

The correct answer to the following question will be "True".

Explanation:

SCADA is a hardware and software elements program that permits industrial enterprises to:

  • Agricultural processes are regulated locally or globally.
  • The human-machine interaction program specifically interfaces with equipment such as cameras, switches, generators, motors and much more.
  • Track, store, and process the data in real-time.

Therefore, the given statement is true.

4 0
3 years ago
Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
DIA [1.3K]
<span>Her liabilities are her credit card bill and her car loan. These are things that she owes and has to pay off, so they are liabilities due to the fact that she owes for these items. Her bonds, piano, bank account, and bicycle are counted as assets.</span>
7 0
3 years ago
Read 2 more answers
An Operating System is an application just like any other applications we use on our
Pie

Answer:

Level of operation

Explanation:

The operating system is the system that enables other software to run on a device. It therefore handles the data between the user and the different features of the hardware, such as hosting device drivers. It also determines the core language used on the device, such as Windows, apple or Linux. This provides conformity accross devices allowing software and hardware companies to produce compatible products.

6 0
3 years ago
I have science project competition. From where can i buy the parts i dont know any nearby place
dangina [55]
Uuuhh how bouut Walmart or anywere u want really

6 0
3 years ago
Which of the following is a Windows feature that allows you to temporarily store next text
LUCKY_DIMON [66]
You didn't give the options for us to choose from. But I do think I know what you are talking about. It is "Clipboard".
6 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • For local travel addresses and street names should be
    14·1 answer
  • Viet drives around and checks meters to document the amount of electricity used in homes. What Energy pathway is he a part of? E
    9·2 answers
  • The __________ is a visual or textual storyboard that will assist in determining the type of web pages on your site.
    14·1 answer
  • The basic work area of the computer is it screen that you when you first fire up your computer
    6·1 answer
  • In Java; Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or
    10·1 answer
  • Give a detailed example of how an app (that you use regularly)uses parameters. You must state the app's name and function, the p
    7·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
    12·2 answers
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!