1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
14

By applying styles formats are being applied ?

Computers and Technology
2 answers:
Dovator [93]3 years ago
7 0

Answer:

A

Explanation:

The same formats are being applied.

VikaD [51]3 years ago
5 0

Answer:

A

Explanation:

Let's take the letters in a keyboard. If I were to type a document; there are several word format I can chose like Calibre, Times New Roman, Gothic etc. However for each word format I can make the words bold or italicized which are styles.

You might be interested in
Explain why the intangibility of Software System poses special problems for Software Project Management
Murljashka [212]
<span>Intangible system is that system whose services are not visible</span>
4 0
3 years ago
How do science, mathematics, and technology each influence engineering
Cerrena [4.2K]

Answer:

In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!

Explanation:

6 0
3 years ago
Read 2 more answers
Describe the difference between Global knowledge and personal idea. Why is it important to give credit to others by citing their
sergejj [24]

Global knowledge is like common sense, people know these things, but their may be someone else with the same idea. One person can come up with the idea but their is also another with same so don't give someone to much credit.

7 0
3 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Other questions:
  • Web pages with personal or biograpic information are called ​
    10·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on
    8·1 answer
  • The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
    13·1 answer
  • Which of the following is NOT a benefit of safety and health programs?
    11·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • What is Stefen Salvators mom name? For the tvd fans
    12·2 answers
  • Need answer ASAP!!!!
    14·1 answer
  • Which of the following lines of code correctly defines a function called combine? OA define "combine(a, b, c)" as: B. define(com
    9·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!