1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
9

Which of the following statements about the use of desktop publishing software is true? A. There's no visible difference between

pages produced by word processing and desktop publishing software. B. Most publishers prefer to use their desktop publishing software as their main word processor. C. Today's professional-strength word processing programs can do everything high-end desktop publishing software can. D. Most desktop publishers prefer to create the text portion of their documents in a word processing program and import the text into a desktop publishing file.
Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
8 0
The correct answer to the question is option D.

A good number of desktop publishers would rather create the text portion of their documents using a word processing program, and then import the text into a desktop publishing file. Thankfully, w<span>ord processing programs are compatible with desktop publishing and other software programs.</span>
You might be interested in
how many bits must be flipped (i.e. changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase 'a' that’s represente
lianna [129]
Lowercase a is decimal 97 ; upper case is decimal 65

It's easier to think of them in octal, however: a = octal 141, and A is octal 101

octal to binary is easy, each digit is three bits. 
141 = 001 100 001 
101 = 001 000 001

So, how many bits are changed above? 
4 0
3 years ago
What changes the size of a video when played?
Leni [432]

Answer:

D. the browser

Explanation:

it adjusts to the size of your device, including the browser.

hope i helped

8 0
2 years ago
Read 2 more answers
1. find the network address for 172.22.49.252/17
mariarad [96]

Answer:

1. The network address for 172.22.49.252/17 is 172.22.0.0/17.

2. The last valid assignable host address of 172.22.4.129/26 is 172.22.4.190.

3. The first and last host address of 192.167.25.25/16 is 192.167.0.1 and 192.167.255.254.

4. The broadcast address of 10.75.96.0/20 is 10.75.111.255

Explanation:

Subnetting in networking is the process of managing the use of host addresses and subnet masks of a network IP address. For example, the IP address "172.22.49.252/17" is a class B address that receives an extra bit from the third octet which changes its subnet-mask from "255.255.0.0" to "255.255.128.0". with this, only 32766 IP addresses are used, with the network address of "172.22.0.0/17".

7 0
3 years ago
Match the Job description with the job titles.
koban [17]
1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
6 0
2 years ago
Read 2 more answers
Select the answer that best descibes what an opportunity cost is
TiliK225 [7]

Answer:

C.What you gain as a result of choosing one option versus another;a benefit.

Explanation:

6 0
2 years ago
Other questions:
  • Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
    9·1 answer
  • In which setting would you be least likely to find a full-time A/V technician?
    5·2 answers
  • Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees.
    13·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • Why is it important to evaluate the website on which you plan to shop?
    7·2 answers
  • Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
    11·1 answer
  • How are logical operators used?
    14·1 answer
  • Mary works for a multimedia firm, and she spends long hours on a desktop computer. Recently, she expired back pain and visited h
    12·1 answer
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • Mention two strategies of collecting data​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!