1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
14

In textual​ messages, __________ includes the area surrounding​ headings, margins, paragraph​ indents, space around​ images, ver

tical space between​ columns, and horizontal space between paragraphs or lines of text.
Computers and Technology
2 answers:
USPshnik [31]3 years ago
5 0

Answer:

b \ The space between the lines of both paragraphs decreased.

Explanation:

rosijanka [135]3 years ago
3 0

Answer:

The answer is "White space".

Explanation:

The textual​ messaging is a method for name, that consists of choosing verses, a chapter, or even the part of a chapter as a text. This method includes whitespace.

  • It is the area between the items on a website page. Generally, those items are pictures, typeface, and symbols.  
  • It is often used to align elements on a website by providing a smooth flow via the material for all the readers to move across.
You might be interested in
Is a network where connected devices are located within the same building.
Nesterboy [21]

Answer:

Answer A

Explanation:

Answer A, because, metropolitan area network is a network within a city or town and wide area network usually connects many cities. So, both C & D are spread on a wide area.

8 0
3 years ago
Read 2 more answers
What command do you type in the search box to access the command line intrface in windows?
Whitepunk [10]
Cmd.exe



------------------------------------------
3 0
4 years ago
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
How do spear phishing attacks differ from standard phishing attacks?
mina [271]

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

5 0
3 years ago
This activity will help you meet these educational goals:
ololo11 [35]

Answer:

Explanation:

Content Knowledge—You will determine the importance of computer skills, organizational structures, labor laws, community programs and managerial qualities in an industry of your choice.  Inquiry—You will conduct online research in which you will collect information, make observations, and communicate your results in written form.  21st Century Skills—You will use critical thinking and problem solving skills, and communicate effectively

8 0
3 years ago
Other questions:
  • Does the steelseries arctis 9x work with a pcie bluetooth card in windows
    13·1 answer
  • Which is not the option applicable to the technology reference framework for advanced countries?
    11·1 answer
  • Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
    13·1 answer
  • Write a main method that prompts the user for an integer between 1 & 20 (inclusive). If the user enters an invalid number, p
    8·1 answer
  • If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
    14·1 answer
  • Ict quiz I attached a picture
    11·2 answers
  • Jak sie pisze oł na klawiaturze komputerowej
    11·1 answer
  • Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which ke
    10·1 answer
  • Mai lee wants to add a graphic demonstrating a process in her document. which of the following commands should she click in the
    5·1 answer
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!