1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
10

When users talk about font size,

Computers and Technology
2 answers:
MArishka [77]3 years ago
5 0

Answer:

The answer is 10

Explanation:

koban [17]3 years ago
4 0

Answer:

The answer is 10......

You might be interested in
You can align controls in the report design window using the align button on the report design tools ____ tab.
Iteru [2.4K]
<span>You can align controls in the report design window using the align button on the report design tools arrange tab.</span> This tab is used to apply different types of formatting to reports in Access. The user<span> can change one type of control layout to another,  can remove controls from layouts so that she/he can position the controls wherever you want on the report.</span>
4 0
3 years ago
Which part of project management takes deadlines into consideration?
Bess [88]

Answer:

resources because it is the resources that has the second authority over a business

4 0
3 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
How do I make my own extension for chrome?
Alexeev081 [22]
Open your browser and click the 3 strip bar in the conner and then look toward the bottom and click settings and it will open a new browser and then you are going to look at the left side and you will see extension click it and there you go...

4 0
3 years ago
g Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source
Inga [223]

Answer:

Source port number and destination port numbers for segment travelling from HOST B to HOST A are : Source port number is y , and Destination port number is x.

Explanation:

Because in problem statement it given that the TCP segments traveling from Host A to Host B have source port number x and destination port number y. So it is clear that that Host A has a port named x and Host B has a port named y and when segments travels from Host B to Host A the Host B's port becomes source and Host A's port becomes source.

5 0
3 years ago
Other questions:
  • You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration offic
    12·1 answer
  • Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
    7·1 answer
  • Effective teams use strategies that help members work together a) smoothly b) independently c) loosely d) secretly
    5·2 answers
  • 6. When should you return to the right lane after passing another car on the left?
    14·2 answers
  • Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What
    8·1 answer
  • An element in a web page that connects to a different location in the same page or a different page is a _____.
    8·1 answer
  • How many types of string types does python support?​
    13·1 answer
  • CRM software programs are designed to help companies gather all customer contact information into multiple data management progr
    13·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • What is a banner grab?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!