1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
7

How is kerning used in Word?

Computers and Technology
2 answers:
vladimir1956 [14]3 years ago
5 0

Answer:

Following are the uses of kerning in the word is given below .

Explanation:

The keening in the Microsoft word is the method of pushing the characters nearer in by removing the unnecessary space between the character Following are the steps of using the kerning in the Microsoft word .

  • Choose the text that the user wanted kerning in the word .
  • Pressing the Ctrl+D it showing the dialog box.
  • After that there are number of option are seen then tap the check box of the  Kerning of fonts.
  • Fedding the option of spacing as per the user need .
  • Finally click on the "ok" option. It will make apply the kerning  in the Microsoft word
jeka57 [31]3 years ago
4 0

Answer:

to adjust the spacing between characters that make up a word

Explanation:

You might be interested in
Does any body know the name of this sensor? ​
kipiarov [429]

Answer:

ummm it looks like a fingerprint sensor

Explanation:

here a similar pic to it .i hope this helps :)

5 0
3 years ago
8.9 Code Practice
jolli1 [7]

Answer: Here you go, change it however you like :)

Explanation:

v = [24, 20, 29, 32, 34, 29, 49, 46, 39, 23, 42, 24, 38]

usr = int(input("Enter number: "))

print(f"Index: {v.index(usr)}") if usr in v else print(-1)

5 0
3 years ago
Read 2 more answers
If a class contains more than one constructor, describe how the computer determines the appropriate constructor. provide an exam
notsponge [240]
If a class contains more than one constructor, computer determines the appropriate constructor by matching all the attributes, like the number, data type and position. Here's the example where the row public AirConditioner(){} is the default constructor that can use <span>default settings or initialize manually (sorry for tabulation, not my fault)</span>:
<span>class AirConditioner{   enum ConditionerMode{      Automatic,  }   public ConditionerMode Mode;   public int MinTemperature = 18;   public int MaxTemperature = 20;
   public AirConditioner(){    }
   public AirConditioner(ConditionerMode mode){       Mode = mode;   }     public AirConditioner(ConditionerMode mode, int MinTemp, int MaxTemp){      Mode = mode;      MinTemperature = MinTemp;      MaxTemperature = MaxTemp;   }}</span>
5 0
3 years ago
What are the answers for edhesive quiz 2? I can’t add more than 1 photo...
KatRina [158]

Answer:

i have no idea srry

Explanation:

hi

7 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Other questions:
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • What benefit does internet have​
    11·1 answer
  • Megara would like to create a web page using web design software, but she does not have any money to spend. What would you sugge
    15·1 answer
  • Which philosopher believed that if we carefully examine the contents of our experience, we find that there are only two distinct
    10·1 answer
  • Grading on the curve is a method of grading that is based on the belief that letter grades for any given class should be distrib
    8·1 answer
  • Would increasing your ROM, increase the efficiency of a computer system.
    11·1 answer
  • 50 PTS
    5·1 answer
  • 3. Cellular phone technology works on a system of geographically separated zones
    12·1 answer
  • Which of these is a standard for describing a wifi network?
    14·1 answer
  • Which of the following does NOT describe the characteristics of cyberbullying?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!