1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
6

If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki

ng it bigger by adjusting it to be SmartArt by making it smaller by adjusting it to be a different style by making it thinner by making it thicker by adjusting it to be a different color by rotating it
Computers and Technology
2 answers:
lesantik [10]3 years ago
7 0
The first two make the most sense.
I hope this helps!
borishaifa [10]3 years ago
6 0

Answer: The correct answer is everything except adjusting it to be SmartArt. You can originally add it as SmartArt if you are adding the triangle through that feature.

Explanation: There are a number of ways that a triangle can be adjusted after being inserted into a diagram. The different ways include:

-by making it bigger

-by making it smaller

-by adjusting it to be a different style

-by making it thicker

-by adjusting it to be a different color

-by rotating it

You might be interested in
which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
snow_lady [41]

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

6 0
1 year ago
In report design view, you can use commands on the align button of the _____ tab.​
gogolik [260]
I'd say the Arrange tab

Sizing and moving fields in design view can sometimes be time consuming. Be that as it may, we can always use the tab order dialog box to perform this operation. To do so, we select the labels and fields in question, proceed to the Arrange tab, sizing and ordering group and then click on the Align button.


5 0
3 years ago
40 points
NNADVOKAT [17]

Answer:

repetition and balance

Explanation:

4 0
3 years ago
Read 2 more answers
Namecoin is an alternative blockchain technology that is used to implement decentralized version of Routing Banking System.A. Tr
vova2212 [387]

Answer:

False

Explanation:

Namecoin is a type of crypto currency which was originally pronged from Bitcoin software. It is coded in the fashion of Bitcoin with the same algorithm as well. Hence it is not a blockchain technology that is used to implement decentralized version of Routing Banking System. Namecoin can store data within its own blockchain transaction database.

4 0
3 years ago
Which best compares portrait and landscape orientations?
julsineya [31]
#2: Portrait taller than wide & landscape wider than tall
8 0
3 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • (Statistics) Write a program that includes two functions named calcavg() and variance(). The calcavg() function should calculate
    10·1 answer
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • i set up an account and paid the yearly fee, now it's asking me to join. i've tried to log in and brainly isn't accepting my ema
    8·1 answer
  • Use HTML to create a web page
    10·1 answer
  • Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with
    9·1 answer
  • What is the function of a breadcrumb trail in a website?
    13·1 answer
  • What sort of negative outcomes are possible for this type of risk?
    14·2 answers
  • What is computer software​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!