1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
15

If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?

Computers and Technology
1 answer:
elixir [45]3 years ago
4 0

APPLIES TO: Excel 2016 for Mac , PowerPoint 2016 for Mac , Word 2016 for Mac , Word for Mac 2011 , More...Which version do I have?You have choices when you want to enhance the appearance of your document quickly. You can start creating a document by using a template, or you can apply themes and, if you're in Word, you can apply styles.
Template
Templates are files that help you design interesting, compelling, and professional-looking documents. They contain content and design elements that you can use as a starting point when creating a document. All the formatting is complete; you add what you want to them. Examples are resumes, invitations, and newsletters.
Templates
Theme
To give your document a designer-quality look — a look with coordinating theme colors and theme fonts — you'll want to apply a theme. You can use and share themes among the Office for Mac applications that support themes, such as Word, Excel, and PowerPoint. For example, you can create or customize a theme in PowerPoint, and then apply it to a Word document or Excel sheet. That way, all of your related business documents have a similar look and feel.
Word Theme Example
Word styles
Themes provide a quick way to change the overall color and fonts. If you want to change text formatting quickly, Word styles are the most effective tools. After you apply a style to different sections of text in your document, you can change the formatting of this text simply by changing the style. Word includes many types of styles, some of which can be used to create reference tables in Word. For example, the Heading style, which is used to create a Table of Contents.
Text alignment buttons JPN
You might be interested in
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
Which of the following is not an algorithm?
Kipish [7]

Answer:

The correct answer is: "D. shapoo instructions (lather, rinse, repeat)".

Explanation:

Among the options given, letter D is the only one which does not apply and  may not function as an algorithm. An algorithm is a set of rules and/or instructions which aims at solving a problem and/or task, therefore, "shapoo instructions" do not classify as an algorithm because they are only written informations to explain how to use a product (lather, rinse, repeat), rather than setting a procedure for solving a problem in terms of technology tools. All the other options are examples of algorithms because they already exist as such and also function as technology tools.

(ps: mark as brainliest, please?!)

7 0
3 years ago
It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
AleksandrR [38]

Answer:

Management and coordination of security-related resources

Explanation:

It is essential to make sure that an information security program is highly secured and non-authorized personnel cannot get access to the program. The security of the program is also important to ensure that valuable information and data of clients are safe. This is one of the most vital in security management.

8 0
3 years ago
In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
Lady_Fox [76]

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

8 0
3 years ago
Which page layout is most commonly used for a website with a large navigation menu?
mestny [16]

Explanation:

The Name is called, (navigation menu..)

to direct users 2 info., they look up...

7 0
2 years ago
Other questions:
  • Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
    7·1 answer
  • The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
    11·1 answer
  • Assume you have a sorting algorithm that you can use as a black box. Use the sorting algorithm to sort the input list. Now write
    10·1 answer
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • Which software is primarily used to create
    15·2 answers
  • The decimal number 3 is ___ in binary the 2s column plus the 1s column.
    11·1 answer
  • Which of the following will increase the level of security for personal and confidential information on a mobile device if the d
    14·1 answer
  • What is the code i need to do
    12·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!