1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

When you click Rotate Left on the Drawing toolbar to rotate a graphic in a document, how many degrees does it rotate?

Computers and Technology
2 answers:
DIA [1.3K]3 years ago
8 0
I am pretty sure it would be 90 degrees.. 
frosja888 [35]3 years ago
3 0
I believe it rotates 90 degrees to the left. If not then its 45 degrees
You might be interested in
Write a program to prompt the user for a positive integer: N. The program will repeatedly divide the input in half using a loop,
a_sh-v [17]

Answer:

using python to write the program

Explanation:

#To use the log function, the module must be imported

import math

n=int(input("Enter number to be halved"))

count=0

while(n>1):

   count=count+1

   n=n//2

print("The number halved is now ", n, "The is the ", count, "iteration")

x = math,log(2,(n))

print("The log of n is:", x)

5 0
3 years ago
Which wireless communication is typically limited to six feet of distance?
Tcecarenko [31]

Answer:

Bluetooth is a wireless communication    is  typically limited to   six feet distances

Explanation:

Bluetooth is one type of communication maximum it covers  10 meters to 30 meters.   but it is one to one communication made for data transactions.  After  25 meters of coverage on communication will be very slow on data transactions. But Bluetooth has also had a limitation.

IR.  It is one of communication where infrared technology used. It is like face to face communication and speed of data transaction limited and it is also one to one communication made for data transactions. Communication paired and covered very little distances.

NFC it is chip-based and covers very little in fact just to device meet each and communication started. And very it caries very little data during the data transactions. it is also one to one communication made for data transactions

RFID is one of communication and it is powerful to cover more areas with multiple connections at the same time. It has a limitation  in distance and it covers  like a net with a specific distance  

4 0
4 years ago
Why does a HTML seen to work even when its broken? why does the code sometimes turn pink?
OverLord2011 [107]

the reason HTML seems to work even if it has syntax errors is due to browser having built in ways to parse the code meaning it will still show but most likely look way different then you would want.

the code may turn pink due to syntax errors

5 0
4 years ago
Who do you like more?<br><br>Lolbit<br><br>-or-<br><br>Mangle
PolarNik [594]

Answer: lolbit

Explanation: she is my glitchy idol along with the shadows and Mr. Afton's cult.

8 0
3 years ago
Read 2 more answers
How to share excel file for multiple users office 365?.
Sholpan [36]

Answer:

You would need that person email to share it with them.

5 0
2 years ago
Read 2 more answers
Other questions:
  • If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
    9·2 answers
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • Which two jobs have high demand need for practitioners( have a skill shortage)
    13·1 answer
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
    12·1 answer
  • What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
    5·1 answer
  • How is a composite key implemented in a relational database model?
    11·1 answer
  • How does a author develop a character in a story?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!