1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
4 years ago
10

Which of the following does every font that you choose communicate, either on a conscious or subconscious level?

Computers and Technology
2 answers:
Aleks04 [339]4 years ago
8 0
~~~~~~~~~~~~~~~~~~~~~~~~~~~
I believe it's B, sorry if I'm incorrect.|


If I'm right, then I hope this helps. :)
~~~~~~~~~~~~~~~~~~~~~~~~~~
sergeinik [125]4 years ago
3 0
I believe it is b so I will just leave it at that

You might be interested in
Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
GaryK [48]

Answer:B. Are used to create, organize, and manage databases

Explanation: Database management system (DBMS) is a computer software which is used to collect, analyse or evaluate and retrieve data from a database. It is essential to the flow of businesses or other activities of an organisation.

Examples of database management system softwares MICROSOFT ACCESS,FOXPRO,ORACLE etc all this are effective as it helps to manipulate the data structure,field names,the file formats etc.

3 0
3 years ago
Which technological tool is important for storing critical files?.
Vanyuwa [196]

The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.

<h3>Battery backup systems</h3>

A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.

In computation, there are three major classes of batteries systems:  Lead-Acid, Nickel-Cadmium, and Lithium-Ion.

An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.

Learn more about battery backup systems here:

brainly.com/question/7125266

3 0
2 years ago
A lot of computations involve processing a string one character at a time. Often they start
dedylja [7]

Answer:

The last character in the string processed is "t".

Explanation:

The index start from 0 and the len(fruit) is 5.

When index is 0 which is less than 5; "f" is printed

When index is 1 which is less than 5; "r" is printed

When index is 2 which is less than 5; "u" is printed

When index is 3 which is less than 5; "i" is printed

When index is 4 which is less than 5; "t" is printed

When index is 5, the condition is false; so the loop content is not executed.

Therefore, the last character traversed in the string "fruit" is "t".

3 0
3 years ago
All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
Aliun [14]

Answer:

The code will be a java-script code

Explanation:

public abstract class Phone{

    private String phoneNumber ;

    public Phone  (String thePhoneNumber) {

        phoneNumber = thePhoneNumber ;

    }

    public  String getPhoneNumber ( ) {

        return phoneNumber ;

    }

public String toString (  ) {

    phoneNumber = "# (" + phoneNumber + ") " ;

    return phoneNumber ;

   }

public abstract boolean createConnection (Network status) ;

public abstract void closeConnection(  ) ;

}

6 0
3 years ago
In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is
STatiana [176]

Answer:

Record

Explanation:

4 0
3 years ago
Other questions:
  • A DTP firm has published and printed flyers for an upcoming fundraising event. In which section of the flyer would you find the
    6·2 answers
  • Complete the getNumOfCharacters() method, which returns the number of characters in the user's string. We encourage you to use a
    15·1 answer
  • On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on
    13·1 answer
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • To quit, a user types 'q'. To continue, a user types any other key. Which expression evaluates to true if a user should continue
    7·1 answer
  • How do we store value in a variable? Give an example
    15·1 answer
  • Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to inter
    8·2 answers
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
  • joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm h
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!