1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
7

A commonly used font style is _____. superscript periwinkle times new roman point

Computers and Technology
1 answer:
ANEK [815]3 years ago
5 0
Times New Roman is a more commonly used font style, I believe.
You might be interested in
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
When _______ wordart, you need to consider both the font size of the text and the size of the text box that contains wordart?
padilas [110]
The correct answer is resizing. If you're making a logo and creating wordart. you have to care about resizing because the art needs to be clearly visible and appealing no matter the size. If you place it in a box, you have to care that it doesn't go over the edges of the box or anything similar that might seem appalling.
4 0
4 years ago
Very small changes in size due to the wearing of a part can be detected by using a A. micrometer. B. metal rule. C. gapping tool
JulijaS [17]
Very small changes in size due to the wearing of a part can be detected by using a "A. micrometer", since this is the smallest form of measurement on the list, and would detect small changes. 
8 0
3 years ago
Write 4 types of viruses , explain them briefly.
wariber [46]

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8 0
3 years ago
Investigar cuáles son los Sistemas Operativos más utilizados en la actualidad. ¿cuáles son las características principales de ca
RoseWind [281]

Answer:

Un sistema operativo es un programa de computadora o colección de programas de computadora que tiene como objetivo facilitar el uso de una computadora, proporcionando el enlace entre el hardware de la computadora y los programas de aplicación que el usuario desea ejecutar en la computadora. El sistema operativo es responsable de la gestión del hardware central, la coordinación de las actividades informáticas y la distribución de recursos en la computadora. Puede verse como lo "básico" de la computadora: un conjunto estandarizado de reglas que determina cómo los programas y los usuarios pueden usar las diferentes partes de la computadora.

Los sistemas operativos modernos comunes incluyen Microsoft Windows, Mac OS, Linux, BSD y Solaris. Microsoft Windows tiene una fuerte participación de mercado dominante para computadoras de escritorio y portátiles. Sin embargo, las computadoras que se usan como servidores ejecutan con mayor frecuencia Linux u otros sistemas similares a Unix.

4 0
3 years ago
Other questions:
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?
    6·2 answers
  • Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
    12·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • Which of the following is one way a corporation can raise money?
    14·1 answer
  • The fact that the impact of changes in the elements making up an IT (software) project are not proportional or intuitive is rela
    5·1 answer
  • ____ a British mathematician devolved the concept of a programmable digital computer and worked with Ada Lovelace to design the
    13·1 answer
  • Your company is planning to storage log data, crash dump files, and other diagnostic data for Azure VMs in Azure. The company ha
    12·1 answer
  • 1.What is the output of the following program? [10 Marks]namespace ConsoleApp1{class Program{static void Main(string[] args){int
    13·1 answer
  • Public class Billing {
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!