1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
1 year ago
12

What is a counter? In typography

Computers and Technology
1 answer:
Ostrovityanka [42]1 year ago
7 0

answer:

in typography, it is an area entirely or partially enclosed by a letter form or a symbol

explanation:

・two types: closed & open

・closed —  A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q

・open — c, f, h, s

You might be interested in
What's a good show to watch on Netflix?
AysviL [449]

Kengan Ashura and Umbrella Academy are two of my fav shows on Netflix

6 0
4 years ago
Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
olga2289 [7]

Answer:

Start

Input n, 2

Calculate if (n%2==0) then is divisible else not divisible

Output number is divisible or not

Stop

Explanation:

3 0
3 years ago
Select each of the steps involved in creating a table in a presentation.
klio [65]

Answer:

huh? Making your presentation more interesting through the use of multimedia can help to improve the audience's focus. PowerPoint allows you to use images, audio and video to have a greater visual impact. These visual and audio cues may also help a presenter be more improvisational and interactive with the audience.

7 0
3 years ago
PLEASE HELP!!! Me turn this into a video & add liana flores- raise the moon (instrumental) in the background for the music.
Marina CMI [18]

Answer:

Try going to your settings and allow output camera

Explanation:

5 0
2 years ago
Read 2 more answers
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
Other questions:
  • 8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
    7·1 answer
  • What is a organisation in office technology
    7·1 answer
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • Which tool is best used to test an electrical current for a power source?
    8·1 answer
  • Which term is used to define the wires on a motherboard that move data from one part of a computer to another?
    13·1 answer
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
  • Hue purchased 50 shares of stock on April 24, 2019. The price skyrocketed, so she decided to sell the stock in April of 2020. Wh
    12·1 answer
  • Which longstanding restaurant chain closed its last location in lake george, new york?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!