1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
11

The presentation ____ determines the formatting characteristics of fonts and colors.

Computers and Technology
2 answers:
leonid [27]3 years ago
6 0
The presentation theme determines the formatting characteristics of fonts and colors.
Likurg_2 [28]3 years ago
5 0
Hey there,

The theme of the presentation determines the formatting charecterísticas of fonts and colors.

Hope I helped :)

~Char
You might be interested in
Suppose that the content of the input file is: 14 13 26 8 -11 36 0 -1. What is the output of the following code? ifstream myInfi
tester [92]
I do not know, i really hope you dont fail!!!!!!!!!
3 0
3 years ago
Read 2 more answers
Write the function setKthDigit(n, k, d) that takes three integers -- n, k, and d -- where n is a possibly-negative int, k is a n
liq [111]

Answer:

Explanation:

Let's do this in Python, first we need to convert the number into string in order to break it into a list of character, then we can replace the kth character with d. Finally we join all characters together, convert it to integer then output it

def setKthDigit(n, k, d):

n_string = str(n)

d_char = str(d)

n_char = [c for c in n_string]

n_char[k] = d_char

new_n_string = ''.join(n_char)

return int(new_n_string)

6 0
3 years ago
Is anybody has to know the person delete account or not on brainly pl plz​
Oliga [24]

Ummmm.......

Nah.......

8 0
2 years ago
Showrooming is associated with apps designed to fulfill which primary motivation?
Luden [163]
300 because it was good for it
6 0
2 years ago
What is diffie-hellman most commonly used for?
Alex777 [14]
DH is an algorithm to derive a shared secret over an unsafe channel.

Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.

The secret can be used to subsequently encrypt communications with a symmetric algorithm.

TLS uses this approach.
6 0
3 years ago
Other questions:
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • Which advertising medium has the widest reach on a global front?
    12·1 answer
  • Given the following while() loop, which statement is true assuming A,B,C,D are int variables and A > B? while ( ( A >= B)
    8·1 answer
  • Explain the strengths and weaknesses you have experienced with content information
    10·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • HELP PLZZZZZZZZ!!!!!!!!!!!
    14·1 answer
  • Which of the following is a primary disadvantage of using a GUI HTML editor to develop your Webpages?
    10·1 answer
  • 4. Compute the following additions
    7·1 answer
  • Choose 2 statements that correctly describe the time complexity of data structures with N data.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!