1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
5

To specify your preferred colors, fonts, and effects for a document, which of the following should be done?

Computers and Technology
2 answers:
Lelu [443]3 years ago
5 0

Answer:

2. Create custom theme.

Explanation:

The theme stays through the entire document. Custom paragraph style only changes the theme for that paragraph, and for the custom character style, it only changes the style of <em>that character </em>but throughout the entire document. i.e. I want the color of the character E to be green. the custom character style will cover that. Also, the custom theme fonts will only change the theme for that certain font...

Bond [772]3 years ago
5 0

Answer:

The theme stays through the entire document. Custom paragraph style only changes the theme for that paragraph, and for the custom character style, it only changes the style of that character but throughout the entire document. i.e. I want the color of the character E to be green. the custom character style will cover that. Also, the custom theme fonts will only change the theme for that certain font...

Explanation:

You might be interested in
What is meant by close to 75% of all viruses is contracted through friendly means?
snow_lady [41]

Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.

Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.

4 0
4 years ago
A computer processes data using only 1s and 0s.<br><br> A.True<br><br> B.False
stiks02 [169]
True. That data is called binary
4 0
4 years ago
Which open-sourced packet capture tool uses linux and mac os x operating systems?
Leto [7]

Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.

<h3>What is tcpdump?</h3>

Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.

This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.

Read more on tcpdump here: brainly.com/question/14485515

#SPJ12

5 0
3 years ago
What happens to the files and folders on the desktop when the computer is turn off
andriy [413]

Answer:

All of the files are stored on a hard-drive. Except for the files you just viewed before turning off the computer, which is stored in the RAM (Random Access Memory). If your computer is a desktop, and the power goes out while looking at a photo/pdf, you may corrupt/lose the image if the computer didn't have enough time to store it in the hard drive. Everything in the hard drive is 'scratched' into it like a record. If you delete a file, that part of the disk is 'smoothed' as best as it can. If you upload another file, you might corrupt/ruin the image/pdf. Think of the smoothing like recording a football game over an old VHS of Winne the Pooh. If you have any other questions, please ask by commenting on this answer!

4 0
3 years ago
WHAT ARE THE CONTENTS THAT WE SHOULD USE FOR THE PRESENTATION OF DIGITAL WORLD
Lana71 [14]

Answer:

Introduction

Importance

Advantages

Disadvantages

Effects

Conclusion

8 0
3 years ago
Other questions:
  • Power point 2016 which chart element provides the boundaries of the graphic?
    6·1 answer
  • The leading membranophone in "Kan andi ghazal" is the ________. (If you can not access the audio file here, please go to modules
    11·1 answer
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
    12·1 answer
  • The ____ of an identifier refers to where in the program an identifier is accessible (visible).
    10·1 answer
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • What should be done on a tablet in order for that tablet to cease all network connections?
    7·1 answer
  • Why might the government censor what its citizens see on the internet?
    13·2 answers
  • Change 'What do they do' into passive voice​
    9·2 answers
  • The Danger zone around a robot is?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!