1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
6

Which character formatting effect makes text appear in a small font size below the midpoint of a line of text

Computers and Technology
1 answer:
pav-90 [236]3 years ago
4 0

Answer:

Superscript or Subscript

Explanation:

The superscript or the subscript is a type of character which is set a little lower or more than the normal line of type. And it is generally small as compared to the other texts. The subscript does appear at or less than the baseline, and the superscript is above. And for the superscript, you need to press the Ctrl + Shift + + ( press and at the same time also hold the Ctrl and the Shift, and finally press the +). And for the subscript, you need to press the Ctrl + Shift ++(Press and at the same time also hold the Ctrl. and finally press the =). And pressing the corresponding shortcut once again, you will be back to the normal text.

You might be interested in
Would it be possible to make VR technology in a way that our brain sees imagined experiences using simple impulses (like words)
Ludmilka [50]

Answer:

theoretically yes. we would need to cross and langue gap because our brain signals wouldn't understand words

Explanation:

educated quess

7 0
2 years ago
The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
Andru [333]

Answer:

light year

Explanation:

Its is equal to 9,500,000,000,000km

5 0
3 years ago
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
sveticcg [70]

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

3 0
2 years ago
You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
mestny [16]

Answer:

Option B i.e., Update the UEFI firmware.

Explanation:

The user had many periods of using the same machine. He wants to update the processor to increase the existing service period. Later, he tests the paperwork onto the motherboard and buys the best motherboard-supported processor.  

While the user starts the machine, though, that makes a noise constantly, nothing is shown on its monitor and it wouldn't start. So, the first step is he will update firmware from UEFI.

Thus, the other options are not correct according to the scenario.

6 0
3 years ago
Spoken word and written text are different because...<br><br>Plz help
34kurt
I am guessing that spoken words can have emotions in then and can also have an accent while written text has no emotion or an accent.
8 0
3 years ago
Other questions:
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • How to search multiple microsoft word documents?
    15·1 answer
  • Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their
    11·1 answer
  • If you're using the paintbrush tool and want to change the color of the paint being used what should you change
    6·1 answer
  • Dust buildup inside a desktop PC case can be managed effectively by ____.
    7·2 answers
  • The right of workers to seek safety and health on the job without fear of punishment is spelled out in:
    8·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • A mobile device user has tried to install a new app numerous times without success. She hasclosed all unused apps, disabled live
    12·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
  • What to do if you click on a phishing link on iphone
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!