1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
1 year ago
11

PLEASE HELP ME

Computers and Technology
1 answer:
Leto [7]1 year ago
8 0

The steps to executing the above Desktop Publishing  assignment is as follows:

  1. Open Mic. rosoft Word on your computer
  2. Highlight the referenced text and paste onto the empty work space
  3. Highlight all the text using CTRL + A
  4. Navigate to the Justification Button/ Tool as shown in the image and click
  5. While keeping the text highlighted, click on the "Line and Spacing Tool" as indicated in the image
  6. Select the "1.5" spacing action button
  7. Use CTRL + S to save your work.

<h3>What is desktop publishing?</h3>

Desktop publishing is the process of creating documents on a computer using page layout software. It was virtually solely used for print publications at initially, but it now now aids in the development of numerous types of web material.

A desktop publishing software (DTS), sometimes known as a "page layout program" or "publishing program," has full page design features, such as magazine-style columns, rules and borders, page, chapter, and caption numbering, and accurate typographic alignment.

Learn more about desktop publishing:
brainly.com/question/7221277
#SPJ1

You might be interested in
Question #8
White raven [17]

Answer:

The other person is correct the answer is 7

Explanation:

I got it right on edge

3 0
3 years ago
Write the definition of a method dashedLine, with one parameter, an int. If the parameter is negative or zero, the method does n
ZanzabumX [31]

Answer:

import java.util.Scanner;

public class DashLine {

public static void main(String[] args) {

// Declaring variables

int n;

/*

* Creating an Scanner class object which is used to get the inputs

* entered by the user

*/

Scanner sc = new Scanner(System.in);

// Getting the input entered by the user

System.out.print("Enter a number :");

n = sc.nextInt();

// calling the method by passing the user entered input as argument

dashedLine(n);

}

//This method will print the dashed line for number greater than zer

private static void dashedLine(int n) {

if (n > 0) {

for (int i = 1; i <= n; i++) {

System.out.print("-");

}

System.out.println();

}

}

}

Explanation:

5 0
3 years ago
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
What is one way that cell merging is used?
sdas [7]
Apply formatting to all cells
5 0
2 years ago
Other questions:
  • What are the tiny little dots that make up a digital photograph?
    8·2 answers
  • What did you include in your response? Check all that
    15·1 answer
  • ​ A wire service is also known as a ____.
    7·1 answer
  • so im thinking about building my own pc for a decent price can anyone point me to a website where i can buy the parts and name t
    13·2 answers
  • The design of computers, devices, and media in a network is categorized as either client/server or peer-to-peer. what is the ter
    8·1 answer
  • Is there an answer to these picture?
    12·1 answer
  • Why is proper planning important?
    10·1 answer
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • What is one benefit of Powerpoint Online?
    14·2 answers
  • Write an algorithm to sum all numbers between 0 and 1000 that are divisible by ,7​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!