1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
12

What is the use of the text tool​

Computers and Technology
1 answer:
Digiron [165]3 years ago
7 0

Answer:

<h3>This tool allows text to be typed onto the current layer using the Primary color. The Text Controls in the Tool Bar can be used to change the font, the size of the font, formatting, text rendering mode, justification, antialiasing and blend mode.</h3><h3>The text tool creates blocks of editable text. You can set the text to read horizontally or vertically. You can also apply a variety of text attributes to</h3><h3> text—including text and paragraph styles.</h3>

<h3>hope it helps!</h3><h3>please give me brainliest!☕︎♡´・ᴗ・`♡</h3><h3>Thank you!</h3>

You might be interested in
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
telo118 [61]

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

6 0
3 years ago
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
ololo11 [35]
<span>Net View is the command issue from a command prompt to see a listing of the computers in your workgroup.It will display the list of domains,computers resources which have been shared by the specified computer then it will list all computers currently in our domain.The syntax for net view using command prompt NET VIEW [\\computername [/CACHE] | [/ALL] | /DOMAIN[:domainname]].</span>
8 0
4 years ago
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute cons
alexandr1967 [171]

Answer:

c. Attribute constraints

Explanation:

A data catalog identifies all of the following, except: "Attribute constraints"

The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.

Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:

1. Data type

2. Range of values

3. Value for Instructor ID

5 0
3 years ago
In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
allsm [11]

Answer:

WAN router security standard, Web services standard

Explanation:

Complete statement with blanks filled:

In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the WAN router security standard explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the Web services standard identifies which controls are vital for use of Web services provided by suppliers and external partnerships.

7 0
3 years ago
. is the language that Web pages are written in?(PHP,XML,HTML,Javascript)
dalvyx [7]

Answer:

<em>HTML</em><em>(</em><em>hypertext</em><em> </em><em>markup</em><em> </em><em>language</em><em>)</em><em> </em>is the language that Web Pages are written in.

4 0
3 years ago
Read 2 more answers
Other questions:
  • select three types of school which specifically emphasize learning through creativity, self expression, and play
    10·2 answers
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    5·1 answer
  • Your bluetooth headset is waiting for another bluetooth device to locate its signal. what is this mode known as?'
    8·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th
    9·2 answers
  • Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program h
    12·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • What is lossless compression
    6·2 answers
  • Suppose that you have the following declaration:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!