1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
15

"if you add text, delete text, or modify text on a page, word recalculates the location of automatic page breaks and adjusts the

m accordingly."
a. True
b. False
Computers and Technology
2 answers:
Flura [38]3 years ago
8 0

Answer:

The answer to this question is option (a).

Explanation:

In the computer, all the data will store in a file that can be text file, image file, etc. All the file store data into (binary language that is (0,1)). In Microsoft Word or any other word software, we add, delete or modify any text that stores in file.  The software adjusts text location, memory, and breaks the pages automatically.

 So the correct answer to this question is option (a).  

Ann [662]3 years ago
4 0

Answer:

The given statement is true.

Explanation:

Whenever we add, delete or modify the contents in the word document, it automatically calculates the number of words. It adjusts the page breaks according to the number of encounter that we provide apart from modifying or adding the words and the number of backspaces that we enter after adding or while adding the contents.

The page break usually happens when a particular character encounters the “end of the page” and the whole word will be transferred to the next page. But still this “depends on the type of alignment”.

You might be interested in
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
What is the flow of electrons called?
kondaur [170]

Answer:

Electricity is the flow of electrons through a conductor, usually in the form of a wire, this flow is called an electric current.

4 0
3 years ago
In comparing a multi-boot environment and an environment using a type II hypervisor which offers the best performance? Which wou
ElenaW [278]

Answer / Explanation

To answer this question, let us first understand what a multi boot environment is and what an environment using a hypervisor is:

Multiple-booting can be defined or simply refers to the process of installing different multiple operating system on a single computer and also to be able to determine which of the operating systems boot per time.

While:

Hypervisor or a type 2 hypervisor can be described as a form of virtual machine in form of a software that is installed on in an existing operating system of a computer. One of the main benefit of an hypervisor is it enables easy navigation of guest on your computer without actually navigating into your original or primary operating system plus it aid in fast system recovery.

If we now refer back to the question asked in respect to which i would offer as the most convenience, i would prefer the type 2 hypervisor as convenient because i am able to run an operating system inside another operating system so navigating between two operating system would be very easy as compared to the Multi-booting where i have to always shut down an operating system to navigate between the operating system because i can only use one operating system per time.

4 0
4 years ago
What year is the singularity expected to occur?
Nataly [62]
It will occur in 2045
5 0
3 years ago
Read 2 more answers
Dear Brainly, since you don't respond anyother way...
madreJ [45]

Answer:

that's an amen stop deleting our stuff deleters!.!!!!!

6 0
2 years ago
Read 2 more answers
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
    15·2 answers
  • How can a PowerPoint user add a shadow to a table
    12·1 answer
  • With simple segmentation, a process is divided into a number of segments that need not be of equal size. When a process is broug
    5·1 answer
  • Which one of the following items is an example of software?
    5·1 answer
  • Technology deals with...
    12·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • Write a program to read a sentence which is a single string. Then count the number of words in the sentence. The program will re
    7·1 answer
  • ¿Qué tipo de información deben proteger los sitios de comercio electrónico?​
    14·2 answers
  • After you set a goal or purpose for your Web site, what is the next step to designing your​ pages​?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!