1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
9

Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?

Computers and Technology
2 answers:
motikmotik3 years ago
5 0

The procedure for modifying the default bullet can be ;

1. Selecting the text you want to change

2. On the Home tab, find Paragraph group,click drop down arrow to select Define New Bullet

3. Click Symbol and choose the one you want

4. Click Ok.

5. With a similar procedure, you can modify <u>the bullet font, bullet alignment or change the bullet to a picture.</u>


balu736 [363]3 years ago
4 0

Answer:

(A) Select the arrow next to the bullet list option in the Paragraph group

Explanation:

You might be interested in
Today car-buying customers can enter negotiation armed with accurate facts and figures about a car. Describe how car buyers felt
cluponka [151]
Since there was no internet back then, life was hard, the buyers had to pay more money, and it was very difficult. Nowadays it's different. People could just stay home go on the internet and choose a car, then the next day or a few more days, there car is right in their parking lot. Hoped this helps! :)
3 0
3 years ago
A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
rewona [7]

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

8 0
3 years ago
Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
vlada-n [284]

Answer:

The answer is "None of these".

Explanation:

In the given question an array "sales[]" is declared, which contains 50 double type elements, and in the next line, an integer variable j is defined, which uses a for loop. In this question two options is given, in which both are not correct, that can be described as follows:

  • In option (i), A loop is defined that, uses variable j which starts with 0 and ends with 48, So total elements are 48 that's why it is not correct.
  • In option (ii), A loop will use variable j that, starts with 1 and ends with 49, That's why it is not correct.
3 0
3 years ago
Will give brainlyist
In-s [12.5K]

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

6 0
3 years ago
Read 2 more answers
which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
Pani-rosa [81]
The correct answer is Graph Search for Daily News

This does not exist on Facebook, unlike the timeline and the activity log.
3 0
3 years ago
Other questions:
  • Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Ex
    9·1 answer
  • What would you recommend for data segregation if using cloud software
    12·2 answers
  • Marginal ________ shows how much money can be made if a producer sells one additional unit of a good.
    7·2 answers
  • Summarizes statistical data ?
    11·1 answer
  • In his article “is google making up stupid” Nicholas Carr uses a metaphor to suggest that
    11·2 answers
  • Which of the following is not true about VOIP?
    9·1 answer
  • Please help! I tried this by myself. But I am not sure if this is right.
    8·2 answers
  • What is one of the advantages of using an algorithm to solve a puzzle like Kriss-Kross or Sudoku?
    13·1 answer
  • Explain different users of computer in briefly?​
    14·1 answer
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!