1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
9

What is a dropcap as used in a computer word document

Computers and Technology
1 answer:
shutvik [7]3 years ago
3 0

DROP CAP:-

<u>Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.</u>

<u>Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines. The following illustration shows your options for positioning a drop cap.</u>

You might be interested in
VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
Tanya [424]

Answer:

ASIC

Explanation:

Undoubtedly, it is the ASIC and not FPGA. The field programmable Gate Array is meant for general purposes, and ASIC is meant for Specific purposes. And here the application-specific condition holds. We need it for medium production of an image transformation, and this is like Bitcoin which is application-specific. And thus, the correct type of IC which we need in this case is the FPGA, And hence, FPGA is the correct option here.

3 0
4 years ago
What do to keep in a database
igor_vitrenko [27]
<span>Customer Relationship Management is really important for many businesses, in particular, small ones, as it is the focus point of sales and marketing strategies. At the centre of a business’ CRM is their customer database, which is a really helpful tool enabling them to; identify customer trends, create customer loyalty and increase their customer communication. All businesses have a customer database, whether it is a computerised system or a piece of paper with names and details written on. Here are some tips on how to create and maintain your database in order to get the most out of it.</span>
5 0
3 years ago
Read 2 more answers
Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
snow_lady [41]

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

// variables to read birth month and year

int birthMonth,birthYear;

cout<<"Enter the birth month:";

// read the birth month

cin>>birthMonth;

cout<<"Enter the birth Year:";

// read the birth year

cin>>birthYear;

// print the output

cout<<birthMonth<<"-"<<birthYear<<endl;

return 0;

}

Explanation:

Declare two variables "birthMonth" and "birthYear". Read the value of birthMonth and birthYear from user. Then print the birth month and birth year and a dash(-) in between them.

Output:

Enter the birth month:1                                                                                                                                      

Enter the birth Year:2000                                                                                                                                    

1-2000  

Enter the birth month:5                                                                                                                                      

Enter the birth Year:1950                                                                                                                                    

5-1950

6 0
3 years ago
1. Which of the following statements is true regarding the use of refrigerants?
kondaur [170]
A) Records of the dates and quantities of refrigerant recovered and recycled are unnecessary
5 0
3 years ago
Read 2 more answers
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • What was the han dynasty and the roman empire known for?
    5·1 answer
  • Computers are often referred to as _____.
    15·1 answer
  • ____________ is used by IM and other applications that provide voice services over lower-speed digital circuits.
    15·1 answer
  • What are control layouts? What are the two primary control layout options?
    13·1 answer
  • The best way to ensure the accuracy and safety of your accounts is to:
    10·1 answer
  • Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer
    8·1 answer
  • Vocabulary and Bridge Information
    6·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Which TWO of these correctly describe a Trojan horse malware?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!