1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
4 years ago
10

If you click the increase font size button too many times and make the font size too big, you can click the ____ button until th

e desired font size is displayed
Computers and Technology
1 answer:
Anton [14]4 years ago
7 0
Hey there! Hello!

I believe that you can click a button that has something to do with decreasing the font size, to go along with the question, perhaps the decrease font size button. Sometimes these buttons are represented with minus signs or arrows pointing downwards, among other symbols that convey that the font size will be decreasing.

I hope this helped you out! Feel free to ask me any additional questions if you have any. :-)
You might be interested in
Enter a formula or in sales G5 the calculate the difference between the attendance totals for 2018 and 2017
goldfiish [28.3K]

we will write year in column B and column c respectively

2017 and 2018

then we will add months of year from January to December in the cells range from A2 to A13

then we will choose cell g5 and will write the diffrence formula

g5=attendance of 2018 - attendance of 2017"

we put "=" sign to put an formula in excel

then finally we will use fill handle and drag it from g6 to g12

to copy the difference  formula

look at attached file

Download xlsx
4 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
10. Calculate the checksum for blocks of data with the following byte sum. (a) 1220 (b) 950​
OLga [1]

Answer:kalo gk salah yang

a

Explanation:

5 0
3 years ago
Tumblr, Jaiku is an example of _____________ website.
adelina 88 [10]

Answer:

<h3><u>Microblogging </u></h3>

  • <u>One of the best-known channels in the microblogging world. Twitter is a quick and convenient way to share short posts, GIFs, article links, videos and more. Pinterest: Companies on Pinterest link to products, articles and other useful information for </u><u>audiences </u><u>.</u>

Explanation:

<h2>Hope this helps you !! </h2>
3 0
2 years ago
What steps can be used to open the Custom AutoFilter dialog box? Select any cell in the data range.
noname [10]

Answer:

Data

Sort and Filter

Text Filters

Explanation:

Proof that this answer is correct in the file attached.

6 0
3 years ago
Other questions:
  • You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
    10·1 answer
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • Anyone got the edmentum computer programming post test answers?
    6·1 answer
  • What are the cues that a website is safe to use for exchanging sensitive information?
    10·1 answer
  • A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are
    11·1 answer
  • Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
    13·2 answers
  • The third generation of computers was marked by the introduction of ____.
    8·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Write a program to input value of three sides, to check triangle is triangle is possible to form of not​
    11·1 answer
  • Philip took pictures with his smartphone and save them into his computer unless you delete the photos from the computer they wil
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!