1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
11

What is typeface

Computers and Technology
2 answers:
scZoUnD [109]3 years ago
6 0

Answer:

the answer is A - family of fonts.

Explanation:

plato/edmentum users! i got it correct on the test.

Mademuasel [1]3 years ago
4 0
I’m so bored and hungry answer is c 3566
You might be interested in
Typing with capital letters and exclamation points in an e-mail is an example of
Aleks [24]
It's an example of a poorly written email, it looks like somebody is angry and yelling at you, these types of emails can be described as a poor etiquette.
3 0
3 years ago
Read 2 more answers
MODS ONLY answer this, I have something for you. I'm reporting this to make it easier
aliya0001 [1]

Answer:

whyyyyy

have  a good day :)

Explanation:

7 0
3 years ago
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
If i were to give you free points woulld you take them?
kipiarov [429]

Answer:

D) friend me

Explanation:

6 0
3 years ago
Read 2 more answers
. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understo
aksik [14]

Answer:

Explanation:

The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.

class Dollar {

   int dollars;

   double coin;

   private Dollar(int dollar, int coin) {

       this.dollars = dollar;

       this.coin = Double.valueOf(coin) / 100;

   }

   

}

4 0
3 years ago
Other questions:
  • What should the timing of transition slides be per minute?
    9·2 answers
  • Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
    5·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • "Managers and department heads across the nation strategize on a weekly, if not daily, basis. For the past three quarters, telep
    6·1 answer
  • The CSS property of top , bottom , left , or right moves the element the specified distance from the respective edge of the clos
    7·1 answer
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • Now let's create a memo. The memo should include all parts of a memo, and these parts should appear in the correct order. In you
    9·1 answer
  • What did do you do if you made a mistake on a computer?
    14·2 answers
  • Of the various trends affecting the advertising and promotion industry, _____________ offers an opportunity for advertisers to d
    9·1 answer
  • One benefit of taking notes in class is that the student
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!