1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
6

When you format text, what are you doing?

Computers and Technology
2 answers:
vova2212 [387]4 years ago
7 0

Answer:

d

Explanation:

storchak [24]4 years ago
7 0
The answer is d

explanation:
You might be interested in
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
3 years ago
A column to be used in a database is called the
Temka [501]

it is called an attribute

8 0
3 years ago
Kathi, the owner of Klothes for Kats, is excited about the launch of her first Local Catalog ad. She remembers there are a few d
mina [271]

Answer:

Map view

Explanation:

The view that will most likely be displayed would be a Map view, where potential customers can see the Klothes for Kats logo, store information, and in-stock products. This is because Local Catalog ads only have a small space that is used to promote what is being advertised. Therefore, in these small spaces the most important things need to be shown in order to attract as many people as possible with what the store offers. The ad needs to have the logo and store information so that the potential customers can easily know what store is being advertised on the ad. The ad also needs to show some of the popular in-stock products in order to attract individuals that are actually interested in the products that the store is trying to sell.

6 0
3 years ago
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
In linear​ programming, choices available to a decision maker are called
Aleks [24]
Havinh=g the software to do it all

6 0
3 years ago
Other questions:
  • Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of
    7·1 answer
  • CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site
    8·1 answer
  • Which leadership function involves keeping group members focused on the issue at hand?
    6·1 answer
  • Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy
    13·1 answer
  • "You are setting up a new subnetwork on an existing network. Management has asked that you use existing cabling that the company
    14·1 answer
  • What would be the results of the following code? final int SIZE = 25; int[] array1 = new int[SIZE]; … // Code that will put valu
    9·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • It is always safe to enter personal information into a pop-up window. true or false.
    13·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!