1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
6

PLEASE HELP! I'm offering brainliest!

Computers and Technology
1 answer:
Marina CMI [18]3 years ago
7 0

Answer:

1. Undo  2. Font Type   3. Font Size  4. Bold Font 5. <em>Italics  </em>6. Word Color  7.  Document Margins

Explanation:

Did you know that all of these answers are how to format a document?

You might be interested in
The input stream of a stack is a list of all the elements we pushed onto the stack, in the order that we pushed them. If the inp
Sidana [21]

Answer:

Push Z

Push Y

Pop Y

Push X

Pop X

Push W

Push V

Pop V

Push U

Pop U

Pop W

Pop Z

Push T

Push S

Pop S

Push R

Pop R

Pop T

Explanation:

A stack is a term in computer science that defines an abstract data type that acts as a collection of elements. It has two operations which are mainly push and pop.

Push is used in adding elements to the collection, while pop is used in removing elements from the collection.

If the element A has been pushed to the stack, you check if the top element in the pop[] sequence is A or not.

If it is A, you then pop it right, else top of the push[] sequence will be changed and make the sequences invalid.

So, similarly do the same for all the elements and check if the stack is empty or not in the last.

If empty you then print True else print False.

4 0
3 years ago
Since nobody answered, I'm gonna just try this again. I really need help with this so please-
pantera1 [17]

Answer:

3.8

Explanation:

5 0
3 years ago
When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accesso
katrin [286]

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

6 0
3 years ago
Which of the following is a set of short-range wireless technologies used to share information among devices within about two in
8_murik_8 [283]

Answer:

Option (c) NFC

Explanation:

  • The NFC Technology is a Wireless Technology which works in the range of 10 cm or less.
  • NFC stands for Near Field Communications.
  • The name itself indicates that it a communication mode with the near by objects.
  • The NFC technology is used in Access Cards, Payment Cards and Mobile Devices etc.
  • Option (a) IM - Instant Messaging is the instant text messaging technology sends and receives messages over the internet. It is used in Social Media where instant messaging is available. So, option (a) is not correct option.
  • Option (b) text messaging the technology is the technology in which the text messages are sent over the mobile networks ( in case of text messaging in mobile phones ) or over the internet ( emails, blogging etc). So, option (b) is not correct option.
  • Option (d) DES is not a short range wireless technology. So, option (d) is not correct.
  • Option (c) NFC is correct option.
3 0
3 years ago
Can i eat chicken and you shut
scoray [572]

Answer:

ofcccc whenn ?

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program to display a message telling the educational level of a student based on their number of years of school. The us
    6·1 answer
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • Which of the following is not a thing needed to make a network?
    6·2 answers
  • E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
    13·1 answer
  • 61. Select an activity of the Production Phase: a. a web authoring tool is often used b. the graphics, web pages, and other comp
    10·1 answer
  • Aaron has elaborate systems set up on his computer to remind him of all the things he has to do and when he has to do them. The
    12·1 answer
  • The Analytics tracking code can collect which of the following? (select all answers that apply) (1)-Language the browser is set
    15·1 answer
  • The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
    10·1 answer
  • A specific type of computer program that manages the other programs on a computer
    6·1 answer
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!