1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
9

Which statements describe the use of styles in word? Check all that apply?

Computers and Technology
2 answers:
LenaWriter [7]3 years ago
4 0

Answer:

you wanna put the answer's you can choose from

Explanation:

notka56 [123]3 years ago
3 0

Answer:

  • can be applied to paragraphs and fonts
  • saves the user time when doing formatting tasks
  • allows for the definition of reusable formatting
  • can be used to make Word documents look the same

Explanation:

When you want to apply the same formatting to different parts of the document, it is advantageous to use styles. A style is a set of formats that have been given a name. With a single command, you can apply all the formatting with which the style was defined to a text block.

Word has a large number of predefined styles, but the user can create others or change the formatting of existing ones. The Normal style is a predefined style that Word applies to newly created paragraphs. Regarding these styles, we can say that:

  • can be applied to paragraphs and fonts
  • saves the user time when doing formatting tasks
  • allows for the definition of reusable formatting
  • can be used to make Word documents look the same
You might be interested in
Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file trans
Vika [28.1K]

Answer:

UDP Port 69

<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>

Explanation:

UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.

3 0
2 years ago
When comparing different biometric systems, one of the most important metrics used is called the _________, which represents the
Airida [17]

Answer:

Crossover Error Rate(CER)

Explanation:

Crossover Error Rate is an important metrics in the biometric systems.It is the value of FRR and FAR when the sensitivity is framed so that FRR and FAR are equal. The Crossover Error Rate(CER) is suitable for quantitative comparison of different biometric devices, applications or solutions.

8 0
3 years ago
You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
salantis [7]

Home pc1 becouse it is the right one

3 0
2 years ago
When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
timama [110]

Answer:

Expensive is not always better

Explanation:

So I build 2 computers ok

Computer 1: Price 1,999$

<u>Whats Included:</u>

  • Antivirus
  • Anti-Over-Heat
  • Windows 8 Operating Software
  • Free VPN (For Life)
  • 24/7 Support
  • 1 year warranty
  • 3/5 Star Reviews | Main Review Type: Parts Breaking Inside

Computer 2: Price 799$

<u>Whats Included:</u>

  • Anti Virus
  • Anti Over-Heat
  • 1 Year Warranty
  • Windows 10 Operating Software
  • 24/7 Support
  • 10 Year Warranty
  • 4/5 Star Reviews | Main Review Type: Runs Smooth
  • No VPN

<h2>So Computer 2 Has better reviews and a 10 year warranty over computer 1's 1 year warranty</h2>
8 0
2 years ago
Match terms in the first column with the order descriptions in column two.
vichka [17]

Answer:

2 to A

1 to C

3 to B

Explanation:

4 0
3 years ago
Other questions:
  • Which does an icon on the desktop signify?
    12·1 answer
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
    15·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • It connects computers in different cities and different countries
    9·2 answers
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    6·1 answer
  • Explain why the receptionist responded as indicated in the following scenario.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!