1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
14

By applying styles formats are being applied ?

Computers and Technology
2 answers:
Dovator [93]3 years ago
7 0

Answer:

A

Explanation:

The same formats are being applied.

VikaD [51]3 years ago
5 0

Answer:

A

Explanation:

Let's take the letters in a keyboard. If I were to type a document; there are several word format I can chose like Calibre, Times New Roman, Gothic etc. However for each word format I can make the words bold or italicized which are styles.

You might be interested in
Many subject elements make for simple and streamlined looking images. true or false
sukhopar [10]

Answer:

Explanation:

false. many elements means a complicated picture, not a simple one.

8 0
3 years ago
the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world’s ICT capabil
kvasek [131]

Answer:

hi

Explanation:

5 0
2 years ago
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What shou
Alisiya [41]

Answer:

preface the command with sudo

Explanation:

In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.

5 0
3 years ago
2. Imagine that the user at computer A wants to open a file that is on computer C's hard disk, in a peer-to-peer fashion. What p
Elis [28]

Answer:

Since there is no server in a peer-to-peer network, both computers will share resources through the network component used in linking them together such as a cable or a switch.

Explanation:

In its simplest form, a peer-to-peer (P2P) network is created when two or more computers (in this case computer A and C) are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files or through an Ethernet cable. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires using switches as a central connector. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

Please find attached the diagram of the peer-to-peer network of the two computers, computer A and computer. We have two network connections in the diagram.

The first one was implemented using a crossover Ethernet cable to connect both computers through the RJ45 LAN port on their network interface card.

In this network configuration, that will go through the NIC card from Computer C, through the cable to the NIC on computer A and vice versa.

In the second implementation, we used a switch to connect both computers using a straight Ethernet cable.

In this connection, data will go through the NIC card in computer C, through the cable connecting Computer C to the switch, through the switch, then through the cable connecting the switch to computer A and finally through the NIC card on computer A and vice versa

4 0
3 years ago
Which of the following items is an example of software? A. WORD PROCESSING PROGRAM B. KEYBOARD C. PRINTER D. MOUSE
Umnica [9.8K]
Well the only one that is actually a piece of programming is A. Word Processing Program. B, C and  D are all peripherals for a computer not actual software for it. Basically if you have to install it on the computer its software. Now B C and D may need software to make them compatible with your computer they themselves dont need to be installed.
8 0
3 years ago
Other questions:
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    15·1 answer
  • Write a program that asks the user to enter a birth year. the program should then indicate which generation a person of that yea
    14·1 answer
  • What does DKIM stand for?
    9·2 answers
  • Suppose you have an int variable called number. What Java expression produces the second-to-last digit of the number (the 10s pl
    15·1 answer
  • Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server? (Points : 5) Unicast DHCPACK
    8·1 answer
  • Write a program that passes an unspecified number of integers from command line and displays their total.
    5·1 answer
  • 13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
    8·1 answer
  • -- of 5 points Question 3 1 try left While designing a new system, a company uncovered several processes that were quite rule-ba
    6·1 answer
  • What actions might contribute to recommendations you see online?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!