1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
4 years ago
6

Which tool lets you increase the view, but not the size, of text, images, and other content?

Computers and Technology
1 answer:
blagie [28]4 years ago
7 0
Use ctrl + or - or if in microsoft word, use the zoom tool
You might be interested in
QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
valkas [14]

Answer:

The correct answer to the following question will be Option B (Public key infrastructure).

Explanation:

This seems to be a program that allows an individual to deliver an encrypted message or file through some kind of public key that can be unlocked by the intended receiver using another key or code, almost always a private or personal key.

  • This is a collection of functions, rules, equipment, applications, and methods required to develop, maintain, deliver, utilize, save, and withdraw digital credentials, and handle encryption with the public key.
  • This safeguards against hacking or interference with customer information or data.

6 0
3 years ago
Justify the need for branching and jump codes in the instruction set using real world scenarios
topjm [15]

Answer:

As in the real world, people using a program would provide different inputs, that would require different outputs. For example in a traffic light system, there could be a function that constantly checks for if the button is pressed. When the button is pressed the traffic light loop would branch out of its current running code in order to turn the lights to red, and allow the pedestrians to cross.

8 0
3 years ago
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
3 years ago
select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
padilas [110]

Rest your fingers gently on the home row or home keys.

Rest your palms on the keyboard.

Relax your fingers.

All the above are proper keyboard techniques apart from slouch in your chair. It is always recommended to sit up straight with your feet positioned on the floor for balance. Do not cross. Center your body to the H key and have your elbows at sides and bent about 90 degrees. Use correct fingering and deploy touch typing. These and many others will help develop optimal speed and accuracy and help prevent the development of stress injury.

6 0
3 years ago
Read 2 more answers
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Vedmedyk [2.9K]

Answer:

The answer is "\bold{2^n\ \  _{where} \ \ \ n \ is\ bit }"

Explanation:

The Combinations could be produced by using n-bits 2^n . It s enables you to generate the 4-bit numbers that are:

\to  2^4 = 16 combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

7 0
3 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • What is the expected number of jacks-or-better cards in a five-card hand?
    10·1 answer
  • In terms of online safety, what is the grooming process, (predators).
    5·2 answers
  • According to the video, what are some hazards Stationary Engineers may face? Check all that apply. noise, hazardous materials, d
    7·2 answers
  • What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?
    7·1 answer
  • You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for th
    11·1 answer
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
  • How do you chose a profile pic on brainly?
    8·1 answer
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped co
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!