1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
4 years ago
11

Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.

Computers and Technology
1 answer:
Mars2501 [29]4 years ago
7 0

Answer:

1. The home tab

2. Font group

3. The small arrow at the bottom right of the font command group.

4. On "Font" heading (then "All text" subheading)

Explanation:

The following explanation will help Su in accomplishing her task.

1. Go to the home tab;

2. From the home tab, Su will have access to various command groups but in her case, she needs the Font command group.

3. There's a small arrow located at the bottom left of the font command group section; clicking on this arrow will open the font dialogue.

4. On the font dialogue, there are two headings. The "font" heading and the "character spacing" heading.

In her case, she needs the "Font" heading. The font heading also has various subheadings. To access the underline colour option, she needs the "All text" subheading.

See attachment for picture guide.

You might be interested in
To enhance the readability of your document, select a layout that aligns text ________.
Vilka [71]

Answer:

b. only at the left margin.

Explanation:

It's the most widely accepted layout. MLA format, which is used in most professional settings, aligns the body to the left. Though, the answer may be different depending on the language.

5 0
2 years ago
Read 2 more answers
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
Cans someone pls help me to do edhesive 2.5 code practice
Step2247 [10]

Answer:

Xjenwbsjhdbee

Explanation:

Shxbebwhddbd

4 0
3 years ago
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
3 years ago
How do you describe the importance of data in analytics? Can we think of analytics without data? Explain
Marat540 [252]

Answer:

a. It aids in the comprehension of the existing status of the business or process.

b. No, it not possible to we think of analytics without data

Explanation:

a. How do you describe the importance of data in analytics?

Data analytics can be described as the art and science of extracting useful information from data.

It aids in the comprehension of the existing status of the business or process and serves as a solid foundation for forecasting future results. Businesses can use data analytics to better comprehend the present market situation and adjust their processes or trigger the need for new product development to meet market demands.

b. Can we think of analytics without data?

No, it not possible to we think of analytics without data. This is because the raw material that is employed for analytic is data. Therefore, there would be nothing like analytics when there is no data.

7 0
3 years ago
Other questions:
  • A client has an issue with large files taking a long time to open or save. As time goes by, the issue worsens. The client has hu
    8·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Write a program named ArrayDemo that stores an array of 10 integers. (Note that the array is created for you and does not need t
    14·1 answer
  • What is the purpose of a forecast worksheet?
    15·1 answer
  • Number the steps to describe how Tristan can complete
    6·2 answers
  • Um ok that makes sooo much sence
    11·2 answers
  • If opening capital is ks 70000 and closing capital is ks 90000 what is the amount of profit or loss​
    14·1 answer
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!