1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
12

What are the five types of alignment in Word?

Computers and Technology
2 answers:
Mashutka [201]3 years ago
7 0

five types of alignment in Word

<u>Left-aligned:</u>

All lines in the paragraph are aligned towards the left text margin. No additional spaces are added to line. In traditional typesetting terminology it is called as as ragged right.

<u>Center-aligned:</u>

All lines in a paragraph are arranged in the centre within the right and the left text margins.  

<u>Right-aligned:</u>

All lines in a paragraph are aligned towards the right text margin. No extra space are added to line. In traditional typesetting terminology it is referred as ragged left.

<u>Justified:</u>

All lines in a paragraph are expanded so they arrange themselves against t both the text margins. Extra Space is added, between characters and words so as to fill the line. In typesetting references this is referred to full justified.  In this type of alignment all lines except the first and the last lines are affected.

Basile [38]3 years ago
6 0
There are four types of alignment in word.
Left-aligned text
Right-aligned text
Center-aligned text
Justified text
You might be interested in
You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
stich3 [128]

Answer:

I don't speak english

I don't speak english

7 0
2 years ago
The first step in creating photographs with good backgrounds is which of the following? Learning to see the background before ta
defon

Oh I got this! I'm a professional photographer! The answer is Leaning to se the background before taking the photograph.

Plz mark brainliest! So glad I could help, and Have an AWESOME day!!!

4 0
3 years ago
Read 2 more answers
Compare and contrast inertial confinement with thermonuclear reactors.
astra-53 [7]
ICF is a type of fusion energy research that attempts to initiate a nuclear fusion reaction by heating and compressing a fuel target. Its normally in the form of a pellet that most often contains a mix of deuterium and tritium.

A nuclear reactor is a device used to initiate and control a sustained nuclear reaction. Nuclear reactors are used at nuclear power plants for electricity generation. 

Compare: they are both nuclear, they both produce energy, they both are used at power plants.

Contrast: ICF uses fusion, while a nuclear reactor is used to control a sustained nuclear reaction. 

This is all I can help with. By the way, are you in rocket science? 'Cause this stuff is hard.
8 0
3 years ago
When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
Bas_tet [7]

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

5 0
2 years ago
F
Alex_Xolod [135]

Answer:

everything

A.

B.

C.

NOOO.

3 0
2 years ago
Other questions:
  • What can search the internet and select elements based on important words
    10·1 answer
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and trainin
    10·1 answer
  • Knowing the meaning of the acronym WAS I WHY can be most helpful to you when you?
    14·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • Why the internet is not considered a mass medium in Africa​
    13·2 answers
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    13·1 answer
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • can you guys plz answeer this i need help rrly bad and plz no viruses or links or answers that have nun to do with this
    5·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!