1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
6

Which segment is most likely set at 1.0 spacing

Computers and Technology
1 answer:
PilotLPTM [1.2K]3 years ago
4 0
The correct answer is B.
You might be interested in
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What
Vadim26 [7]

Answer:

NOT mobile app. NOT Cloud-based app.

Explanation:

4 0
3 years ago
Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
Rashid [163]

Explanation:

Talk About The Benefits. of your  service over other compines

4 0
2 years ago
Use the modulo operator (%) to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which
uranmaximum [27]

Hi, you haven't provided the programing language in which you need the code, I'll just explain how to do it using Python, and you can apply a similar method for any programming language.

Answer:

def rightMost(num):

   lenNum = len(str(num))

   rightNum = num%(10**(lenNum-1))

   print(rightNum)

   return(rightNum)

Explanation:

In this function we receive an integer number, then we find how many digits this number has, and finally, we find the rightmost digits; the main operation is modulo (takes the remainder after a division), what we want is to take all the digits except the first one, for that reason we find the modulo of the number when divided by ten to the power of the length of the number minus one, for example, if the number is 2734 we divided by 10^(4-1), where four is the length of the number, this way we get 2734/1000 and the module of it is 734.

5 0
3 years ago
Todd insisted on having an image to go with every slide. Is this good or bad?
valentina_108 [34]

Answer:

Yes, Its a good idea but depends upon type of image. Like adding a logo to all the slides at top left corner is not just good but a must for all as well, when we are preparing official documents. However, other images when decided to be repeated must convey the correct intent in each page. If this is not the case, you need to avoid it. Intent is the most important aspect certainly. For rest see explanation.

Explanation:

Yes, and as mentioned above adding logo and other images meaningfully, and with correct intent is a good idea.

However, images must not be blurred, tiny or stretched. Also proper cropping is a must. The border should be solid as well. And when selecting a lot of images, the images must convey the correct meaning together. Moreover, the aspect ratio after stretching must be same as the original. You can do this in PowerPoint by going to format > crop > fill.

Ensure that watermarks are not revealed. Buy them rather than copy from somewhere for better outcome. And never amputate your readers with a headache creating backgrounds. You will loose readers then. The clip arts must be used in right number, and not a lot of them certainly.

Ensure both text and images are in correct ratios. Avoid using more than 2 images per slide.

5 0
3 years ago
Read 2 more answers
Which of the following are considered transactions in an information system?
Marrrta [24]

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

5 0
3 years ago
Other questions:
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • When performing a basic search with Bing, you first type in your search expression and then click a button to begin the search;
    13·1 answer
  • Need help please will mark brainliest
    15·1 answer
  • Mary feels confident managing Google Search campaigns and is interested in extending her marketing reach with the help of Google
    10·1 answer
  • Write a program that passes an unspecified number of integers from command line and displays their total.
    5·1 answer
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    10·1 answer
  • What is an infrastructure dedicated to one organization
    13·1 answer
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
  • Types of Computer games​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!