1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
5

If you want to copy text formatting from one area of your document to another area, _____.

Computers and Technology
2 answers:
REY [17]3 years ago
4 0
Copy and paste should be the answer.
Aleonysh [2.5K]3 years ago
3 0
Copy text formatting in MS Word, you mean?
If so, you can use the format paintbrush tool.

Highlight the area of formatting you wish to copy, then click format painter. Then highlight the area that you're copying the format to, and it should work!
You might be interested in
Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
alexandr1967 [171]

Answer:

..

Explanation:

i dont really know. I am just answering for the sake of points lol

8 0
2 years ago
How much will your assignment be docked if you turn it in late?
o-na [289]
We don’t know ms.Fredrick, you’re on your own here
7 0
3 years ago
Read 2 more answers
It keeps saying “something is going wrong oops!” when i click on my brainly notifications what do I do
AveGali [126]

Answer:

check your app permissions it may be blocking them or try resetting the app

4 0
3 years ago
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
Linux distributions overview? information​
disa [49]

Answer:

Debian

Arch Linux

Ubuntu

Fedora

Manjaro

Linux Mint

Elementary OS

openSUSE

Explanation:

6 0
3 years ago
Other questions:
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
    7·2 answers
  • In Microsoft Word, when you highlight existing text you want to replace, you're in
    7·1 answer
  • A user is trying to delete a file located on an ntfs volume on his windows 8 computer but is unable to do so. Why is this.
    5·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • What does not stand for​
    15·2 answers
  • Sally types documents that have a few numbers but mostly letters. To enter these numbers, she should use the
    12·1 answer
  • By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
    15·1 answer
  • If you want to change the name of a folder that stores Word documents, what should you do before changing the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!