1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
4 years ago
8

If Asa changes the text to bold, he has changed the style. True False

Computers and Technology
2 answers:
pashok25 [27]4 years ago
6 0

False would be the answer


LiRa [457]4 years ago
4 0
True because if you were to bold a text, you have presented that the following text is more important or exemplified. 
You might be interested in
Are NOT likely to stop suddenly.
german

Answer:

trains

Explanation:

4 0
3 years ago
what is musical technology specifically, the origins of its genesis & its importance to the baroque era
ki77a [65]

Answer:

There were three important features to Baroque music: a focus on upper and lower tones; a focus on layered melodies; an increase in orchestra size. Johann Sebastian Bach was better known in his day as an organist. George Frideric Handel wrote Messiah as a counterargument against the Catholic Church

3 0
3 years ago
You add a style sheet link between which opening and closing tags?
Likurg_2 [28]

<link> tag

The <link> tag is most often used to link to external style sheets. The <link> element is an empty element, it contains attributes only.

8 0
3 years ago
How can you get a fraction bar on a calculatar?
ArbitrLikvidat [17]
Convert a fraction to a decimal value using the fraction to decimal calculator by entering your fraction below. Use the “/” symbol for the fraction bar. To convert a decimal to a fraction, use our decimal to fraction calculator. Check out our fraction to percent calculator to convert fractions to a percentage.
6 0
3 years ago
In simplest terms, cyber stalking involves the use of the Internet, e-mail, or other electronic communications devices to stalk
11111nata11111 [884]

Answer:

A. ha--ssing or thr----ning behavior that an individual engages in repeatedly.

Explanation:

S - talking by an online definition is the unwanted ob-sessive attention a person gives to a specific person. So therefore, Cybers - talking can then be defined as harming behavior or unwanted or unsolicited ad-vances directed at another using the Internet and other forms of online communications such as through social media outlets like In-stagram, Face-book, Tumblr, Twitter etc and even emails and cellphones.

Cybers - talking may also include secret monitoring, identity th-eft, regular harm, tarnish of image or property, favours, or gathering personal and private information that may be used to disturb the victim. Note that this behaviour is repeatedly and compul-sive.

5 0
4 years ago
Other questions:
  • When you enable user access control (uac)
    11·1 answer
  • A(n) __________________ device is a breath analyzer on your vehicle that is electronically connected to the ignition.
    11·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • What is 1/2 minus 1/16?
    7·2 answers
  • Which is the answer?
    12·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • Which U.S. government agency first funded the development of the Internet?
    12·2 answers
  • Who invented pascaline and when?​
    11·2 answers
  • Match the term to the correct definition.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!