1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
5

How do you use bold text?

Computers and Technology
2 answers:
taurus [48]3 years ago
8 0

Answer:

Android: Tap and hold the text you're entering in the text field, then choose Bold, Italic, or More . Tap More to choose Strikethrough or Monospace. iPhone: Tap the text you're entering in the text field > Select or Select All > B_I_U. Then, choose Bold, Italic, Strikethrough, or Monospace.

Explanation:

Mrac [35]3 years ago
7 0

Answer:

Depends on what site or app you're asking about. But usually you just select the word or sentence you want to bold using your cursor, then the sentences will be highlighted blue and then click B. Most websites have the bold function denoted with a B so you can easily understand that the button is used for making a word or sentences bold.

You might be interested in
Which algorithm is the oldest of the tcp/ip symmetric-key algorithms?
ohaa [14]
Data Encryption Standard, or DES. 
6 0
4 years ago
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
Viktor [21]

Answer:

Assignee

Explanation:

4 0
3 years ago
Read 2 more answers
Just answer the 2 questions. THX
pogonyaev

Answer:

A then D

Explanation:

3 0
3 years ago
One symptom of malware infection is that your antivirus software is disabled and cannot be re-enabled. Choose the answer. True F
Trava [24]

Answer:

False

Explanation:

Some malware software take advantage of the fact your computer has a virus and will try to advertise "anti-virus" software they made to hurt your computer even more.

4 0
2 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
Other questions:
  • Alice has to move around a lot to fetch objects at her workstation. Which ergonomic principle should Alice follow to prevent str
    8·2 answers
  • ____________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is o
    7·1 answer
  • In java, c or c++ code, when a number begins with a leading 0, what do you know about that number: (example: int zzz = 012;) in
    13·1 answer
  • Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________
    15·1 answer
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • The Color Picker tool enables you to work with color selections. Which of the following color models are used by the Color Picke
    11·1 answer
  • Question :
    6·1 answer
  • . It has been said that technology will be the end of management. Maybe. How about artificial intelligence
    9·1 answer
  • What is a non-example for job application???
    11·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!