1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
10

A formatter is a style of document that has structure and formatting already built-in but allows content to vary.

Computers and Technology
2 answers:
RUDIKE [14]3 years ago
3 0

Answer:

True.

Explanation:

I'm assuming.

I don't know what program it is.

I would say it's that because it's a formatter which means it must have a format built in.

LenKa [72]3 years ago
3 0
Th answer will be true .
You might be interested in
You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
oksano4ka [1.4K]

Answer:

Unity.

Explanation:

Graphic design can be defined as an art which typically involves the combination of texts, images and colors to communicate an idea.

In graphic design, unity refers to the harmonious relationship between the various elements in a graphical piece of art, thus, making it appear as a single beautiful piece. Therefore, unity ensure a piece of work does not appear to the viewer as separate pieces but rather presents it as a single piece.

In this scenario, you are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design are fine, but when they are combined, they just don’t work well together. Thus, the main problem with this logo is unity.

8 0
3 years ago
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
3 years ago
In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
Ludmilka [50]

Answer:

the goal is to understand what users and applications the network will support.

Explanation:

A traditional network design approach is said to follow the structured systems of analysis as well design process that is similar to that which is used in building such applications. The main goal of the application developers is understand and study the needs of the users and also the application which the network will support.

5 0
3 years ago
Use ONE SQL statement to show the total number of actual hours for each customer. In the output, show customer id and the total
valkas [14]

Explanation:

SELECT  

   distributor_id,  

   COUNT(*) AS TOTAL,  

   COUNT(IF(level='exec',1,null)),

   COUNT(IF(level='personal',1,null))

FROM sometable;

7 0
3 years ago
Formatting. Given input that represents a floating point number, that is, made up of digits and at least one decimal point, conv
Ronch [10]

Answer:

s = input("Input a float: ")

print("{:12.2f}".format(float(s)))

Explanation:

  • Read a number  from user using the input function of Python.
  • Use the format function of Python to correctly format the output according to the given requirements.
  • Note: Use Python 3.6 or above for this code to run without any issue.

Output:

Input a float: 1234.56789

1234.57

3 0
3 years ago
Other questions:
  • You are attempting to update a Windows image that has been mounted under C:\mount on your local system. What command must you us
    13·1 answer
  • Attacker player X is standing still on a corner kick, as the ball is played, he jumps up with his arms flailing above his should
    8·1 answer
  • The __________ is a visual or textual storyboard that will assist in determining the type of web pages on your site.
    14·1 answer
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain
    8·1 answer
  • What is also known as a visual aid in presentation
    15·1 answer
  • Why security must be planned, tested, and ready by the time the erp implementation is at go-live?
    11·1 answer
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
  • Select the correct answer.
    13·2 answers
  • Help me pls...
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!