1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
11

What aspect do you need to keep in mind when you add images in a word document?

Computers and Technology
2 answers:
mario62 [17]3 years ago
7 0

Answer:

The aspect to keep in mind when you add images in a word document are Format and position.

Explanation:

When you add images to word documents it is very important that you select format as Picture and layout as tight to enable you put the picture anywhere you want on the document

Trava [24]3 years ago
5 0

While adding images in word you cant do anything with the picture unless you add Wrap text. Usually the wrap text icon is always beside the pic or you can go to Layout or format and select from there. If you're adding a photo between an article, position  works well. You can change the wrap text and position choices according to your needs.

Hope this helps, Please mark as brainliest

You might be interested in
________ is a process in which computer software that uses statistical analysis, database technology, and artificial intelligenc
QveST [7]

Answer:

Data Mining.

Explanation:

Data Mining is the process in which a computer software uses database technology,artificial intelligence and statistical analysis so that it can find the hidden patterns,connections and trends in the data.To help business owners to make better marketing decisions and predictions about the customer's behavior.

6 0
3 years ago
What is a butt cap? (0.5 points)
777dan777 [17]

Answer:

Butt cap chops off the stroke at the end.

Explanation:

Stroke end are called caps, other parts of a stroke are joins and dashes. There are three types of caps used in Computer graphics design, they are;

Butt cap, round cap and projecting cap.

5 0
3 years ago
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
Artist 52 [7]

Answer:

hey i do not know

Explanation:

3 0
3 years ago
Read 2 more answers
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
3 years ago
Other questions:
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • What is looping in QBASIC​
    9·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • several ways that we commonly use technology today that people couldn't 10 years ago. Are these uses helpful or harmful to socie
    9·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?
    9·1 answer
  • 100 POINTS!!!!!!!
    15·2 answers
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!