1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
9

Which guideline should you follow when selecting the font for a presentation

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
3 0
My school requires us to use Arial and double space it but we have to use font size 30 for title and 24 for the paragraphs.
You might be interested in
What is a ribbon in word
nika2105 [10]
A ribbon is somehing ou earn
7 0
3 years ago
Read 2 more answers
The purpose of a function that returns "void" is:_________. A) To satisfy compiler warnings B) To package a repeated task as a f
galben [10]

Answer:

B) To package a repeated task as a function even though the task does not yield a value

Explanation:

The purpose of a function that returns "void" is to package a repeated task as a function even though the task does not yield a value. Since the function does not return any value, it control returns to the caller.

5 0
3 years ago
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
What is a URI (include example)
fenix001 [56]

Answer:

 URI is the uniform resource identifier and it is basically a sequence of the character which identify the physical and logical resources. The uniform resource identifier basically contain the predefined set of rules and syntax and also maintain the extensibility hierarchical schema.

There are basically two types of URI that are:

  1)  Uniform Resource Name (URN)

  2) Uniform Resource Locator (URL)

For example: HTTP protocol , file transfer protocol (FTP).

 

6 0
3 years ago
A line of text that has an equal number of characters on either side of the horizontal center of the page is called____.
VLD [36.1K]
A) force justified.

If you open up Word (or probably any word processor) and hover over the alignment options in the ribbon (or format the paragraph), it tells you what each one is, and the option that ensures the characters are spread evenly between the margins is labeled "justified."
6 0
3 years ago
Other questions:
  • Universal Containers has implemented a strict software architecture for their custom Apex code. One of the requirements is that
    14·1 answer
  • A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
    10·1 answer
  • [Java] Using the comparable interface
    13·1 answer
  • Help with this chart please
    9·1 answer
  • Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a subli
    13·1 answer
  • It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an
    6·2 answers
  • What are the characteristics of good blogs?
    8·1 answer
  • Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding
    6·1 answer
  • How many hours do you spend on the Internet per day?
    11·2 answers
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!