1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
2 years ago
5

How do you use bold text?

Computers and Technology
2 answers:
taurus [48]2 years ago
8 0

Answer:

Android: Tap and hold the text you're entering in the text field, then choose Bold, Italic, or More . Tap More to choose Strikethrough or Monospace. iPhone: Tap the text you're entering in the text field > Select or Select All > B_I_U. Then, choose Bold, Italic, Strikethrough, or Monospace.

Explanation:

Mrac [35]2 years ago
7 0

Answer:

Depends on what site or app you're asking about. But usually you just select the word or sentence you want to bold using your cursor, then the sentences will be highlighted blue and then click B. Most websites have the bold function denoted with a B so you can easily understand that the button is used for making a word or sentences bold.

You might be interested in
What is also known as a visual aid in a presentation
kari74 [83]

the answer is slide

I took notes off of plato and it quoted word for word

A slide is a visual aid, also known as a single screen of presentation

:) hope this helps

5 0
3 years ago
Read 2 more answers
Create an interactive program to use class a LightsOut class to allow a user to play a game. Each step in the game will require
expeople1 [14]

Answer:

9+10=21

Explanation:

wyd boy

8 0
3 years ago
The devices and methods that enable physically challenged computer uses to control their computer and provide input are referred
Minchanka [31]

Answer:

Assistive technologies

Explanation:

Assistive technologies are adaptive devices and softwares that are designed to serve as aids to people with disabilities in improving their functional capabilities and making them carry out activities that are difficult to perform independently. Assistive technologies include devices and software programs that are designed for physically challenged people to help them improve their use of their computer. Examples include JAWS, Voiceover which are screen reader softwares designed for the visually impaired people.

8 0
3 years ago
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
Elenna [48]

Answer:

denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)

Explanation:

Denial-of-service attack -

It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .

The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .

In case of the distributed denial-of-service attack , the flooding is done by many different sources .

Hence , from the given scenario of the question ,

The correct answer is  denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .

4 0
3 years ago
During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
labwork [276]

Answer: processing

Explanation:

During the processing steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

At this stage, the data that has been gotten will have to be worked on by manipulating it, making necessary calculations in order to get a useful information out of it.

6 0
2 years ago
Other questions:
  • Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
    9·1 answer
  • To have different formatting for odd and even rows, select the _____ option.
    8·1 answer
  • _____________ refers to know-what and know-why of technology.
    12·1 answer
  • The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
    8·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • In two to three sentences, describe one advanced search strategy and how it is useful.
    13·1 answer
  • What are your thoughts on copyright?<br><br> (Write 2 or more sentences)
    9·2 answers
  • Explain why the process of sketching in engineering might resemble a loop or a cycle.
    15·2 answers
  • CreatePolicies<br> I need help with this in java.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!