1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
9

Text box linking is for two or more text boxes in a document, when the text overflows from the first box. Which scenario is the

most useful for creating linked text boxes?
laying out newsletters with limited space and overflowing text
creating visual appeal without images
formatting images and reducing the amount of text on a page
reducing the amount of text on a page and laying out newsletters
Computers and Technology
2 answers:
Julli [10]3 years ago
8 0

Answer:

Explanation:

use the next box i think

allochka39001 [22]3 years ago
6 0

Answer:

laying out newsletters with limited space and overflowing text

You might be interested in
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
Lelechka [254]

The best way to increase collaboration between a supervisor and her or his subordinates, which in this case is the computer programmers, would be through option (A) remove the private offices and cubicles and replace them with large desks and conference tables out in the open.

By choosing to implement an open office layout, greater communication between the supervisor and computer programmers would occur compared to when they were separated.

7 0
3 years ago
Write structured pseudocode to show the following: when you are on time for work you have time to buy coffee
faltersainse [42]

Answer:

If( on_time == True) {

     print("Coffee")

} else {

    print("No Coffee")

}

Explanation:

Step 1 evaluate with a boolean variable if you are on time

If( on_time == True) {

Step 2 if true you have coffee

print("Coffee")

Step 3 if false you have not coffee

print("No Coffee")

3 0
3 years ago
What do we do if IOC is called on the intercom ??
laiz [17]

Answer/Explanation:

Get out of sight of the intruder

Intruder On Campus

5 0
3 years ago
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
slava [35]

Answer: VLAN

Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.

It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and  nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .

3 0
3 years ago
Other questions:
  • What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr
    5·1 answer
  • Interest assessments are always accurate. True False
    5·1 answer
  • Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
    8·2 answers
  • Help with this please anyone
    15·2 answers
  • What are the advantages of saving files in a cloud? <br>Please help!! ​
    11·2 answers
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • Write the implementation of a class Cse20 Topic that represents a topic in the cse20 class. The class should implement the init
    13·1 answer
  • A customer dictates instruction on how to transcribe audio. Do you have to transcribe the instruction word for word?
    13·1 answer
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
  • Lenny copied and pasted content from a commercial website into his research paper without citing his source, passing the work of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!