1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
8

What are some examples of how AutoFormat can convert text as you type? Check all that apply.

Computers and Technology
1 answer:
telo118 [61]3 years ago
7 0

Answer:

-  by converting straight quotes to smart quotes

-  by starting billeted and numbered lists

- by replacing fractions

Explanation:

The exact answer will depend on which program you're talking about, because different programs will implement user-assisting features like AutoFormat differently, based on what the user needs most (in their type of program) or based on the developer's view.

- by converting straight quotes to smart quotes : yes, for most word-processing programs.

- by making sure all images fit on the page : no, not a regular feature

- by starting billeted and numbered lists : yes, that's pretty common in word-processing programs.

- by switching the text to whatever font fits it best : no, the font selection is user's responsibility.  In some programs, they might adjust the font-size to fit a frame automatically however.

- by replacing fractions: yes, if you type 1/2 in most word-processing program, it could be converted automatically to ½.

You might be interested in
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer. It pro
V125BC [204]

Answer: Operating system

Explanation:

  A computer's OS (operating system) is one of the type of computer software and the main function of an operating system is that it helps in managing the hardware, processes, memory and the software of the computer application.

 An operating system basically providing the set of instruction to the computer for the communication purpose and perform various types of task in the computer system.

According to the given question, an operating system is refers to the software program that helps in coordinating all the task and the activities in the computer system.        

 Therefore, Operating system is the correct answer.

3 0
3 years ago
Please select the word from the list that best fits the definition
GalinKa [24]

Answer:

B. Unsafe Sites

Explanation:

Unsafe Sites are not safe and contain content which may be offensive and which could also be harmful for younger children.

6 0
3 years ago
Read 2 more answers
Social networking websites, such as Facebook, Twitter, and Instagram, are best suited for which of the following types of resear
Nostrana [21]
Your answer would be A. getting leads on current topics, developing trends, and subject matter experts.
5 0
3 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
In C#/ Write an application that computes the area of a circle, rectangle, and cylinder. Display a menu showing the three option
irga5000 [103]

Answer:

five nth cut gthrjhyyvhthtcycyhtbycuvhcyhcxhuffffvgxxv,-:

7 0
3 years ago
Other questions:
  • A team is building an application that must persist and index JSON files in a highly-available data store. Latency of data acces
    10·1 answer
  • A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
    13·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • This is the most flexible way to create a query. Used to create queries that displays only the records that match criteria enter
    12·1 answer
  • Technician A says in computer language a 0 or 1 is called a bit. Technician B says in computer language a 0 or 1 is called a byt
    13·1 answer
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • How to call a void method with no parameters IN JAVA?
    8·1 answer
  • Which of the following sentences from the section "The Limits To Free Enterprise With A Mixed Economy" BEST develops a central i
    10·1 answer
  • What are the examples of computer software​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!