1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
4 years ago
14

What should you remember about typography while creating your résumé?​

Computers and Technology
1 answer:
Goryan [66]4 years ago
7 0

Answer:

Times New Roman font with 12 point font size.

Explanation:

Times New Roman is expected to be the regular font type with size of twelve (12).

You might be interested in
What determines how a system will work to meet the business needs defined during system investigation?
devlian [24]
I think, that it consists of (includes); Design, Performance; etc.
8 0
3 years ago
PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
kaheart [24]

D is the answer  motherboard is correct

3 0
3 years ago
The ABC Manufacturing company has a completely automated application system. The system, however, resides on index files and doe
Leni [432]

Answer:

Please see the attached file for complete Answer.

Explanation:

Download pdf
6 0
3 years ago
Read 2 more answers
Please help me i will mark as brainliest​
Daniel [21]

Answer:

1 True

2 True

3 False

4 True

5 True

— hope I helped you

4 0
2 years ago
An ISA specifies a word size of 8 bytes, byte addressability, and an address space of 256 K; it uses single-word instructions (i
VladimirAG [237]

Answer:

2 bytes

Explanation:

Size of the MAR ( memory address register )  = 18 bits = 2 bytes

Given that

address space = 256 K  = 2^8

number of address location= 2^8  * 2^10       ( where 1K = 2^10 )  

                                              = 2^18

Given the number of address location = 2^18 ;

Hence  18 bits are required to store the address of the instruction

6 0
3 years ago
Other questions:
  • In addition to proposing that planetary orbits are elliptical, what other modification did Kepler make to Copernicus’s model? Pl
    15·2 answers
  • Describe your microsoft word skills that need to be improved upon the most.<br><br>​
    8·1 answer
  • Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a
    13·1 answer
  • a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then identifying a
    8·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi
    7·1 answer
  • Which command will provide us with a list of the available internal commands (commands that are part of Command Prompt, such as
    7·1 answer
  • A class researching the world’s population would like to include a graph that shows historical changes. They have information fr
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!