1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
9

Text that is heavier or darker than other text in the document is considered _____.

Computers and Technology
2 answers:
kvv77 [185]3 years ago
7 0

The text that is heavier or darker than other text in a document is considered  Bold.

Hope this helped!~

erik [133]3 years ago
4 0

Answer:

Emboldened

Explanation:

Emboldening is a method of increasing the outline of the font of a particular text. It essentially creates a highlight of the text and makes it easily identifiable throughout the document. In Microsoft word, there are various ways to embolden a text:

1. To embolden a word or text, using the mouse, highlight or select the text and and using the keyboard, hold down the Ctrl key, while the Ctrl key is still depressed, press the "B" on the keyboard to make a text bold.

2. Select the text or word and on the home tab which is at the top of the word screen, click on the "B" icon, this will make the text bold.

3. Also the cursor of the mouse can be placed anywhere on the word to be made bold, after that right click on the word and click on the "B" icon, the word will be made bold.

You might be interested in
Entering the search criteria "B?" would yield which of the following results?
lutik1710 [3]

Answer:

D. Birmingham

Explanation:

Entering the search criteria "B", would yield Birmingham.

6 0
3 years ago
Care and feeding for computer
o-na [289]
Don’t drop it and charge it regularly
5 0
3 years ago
Which program will have the output shown below?
Nutka1998 [239]

Answer: Python

Explanation: All I know is that the programming language is Python.

8 0
2 years ago
Read 2 more answers
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra
devlian [24]

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

4 0
3 years ago
Add criteria to this query to return only the records where the value in the SubscriptionType field is Self or Family and the va
miss Akunina [59]

Click Run in the Results group under the Design tab. Only show records in the search results that have a Credits field value greater than 120. To see the results, run the query. Click the criterion row for the Credits field and enter >120.

<h3>The meaning of the criterion =200</h3>

Equal to or less than 200. To compute statistics like Sum, Average, or Count, add a Total row to the query datasheet.

<h3>How may criteria be set in an Access query?</h3>

Open the query in Design view and choose the fields (columns) you want to set criteria for in order to add criteria to an Access query. Double-click the field to add it to the design grid if it isn't already there.

To know more about criterion row visit:-

brainly.com/question/7301380

#SPJ4

4 0
1 year ago
Other questions:
  • You have installed a streaming video service on your network. You want selected hosts to be able to access this service via a dy
    6·1 answer
  • Do you believe that OOP should be phased out and we should start working on some alternative
    6·1 answer
  • what key aspects did you learn regarding the creation, analysis, and management of information systems? How will this impact you
    5·1 answer
  • What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
    8·1 answer
  • A lottery ticket contains five unique numbers. A set of unique numbers does not contain repeated elements. The winning combinati
    10·1 answer
  • What is the use of jacquard loom
    13·2 answers
  • A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
    8·1 answer
  • What is normalization?
    7·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!