1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
7

To make a duplicate of text, image,chart,graphs etc.​

Computers and Technology
1 answer:
Veronika [31]3 years ago
5 0

Explanation:

You can change the formatting of the rest of the text ( bold, italics, font color or sixe, ect)

You might be interested in
Which term is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a d
Olegator [25]

The question below has multiple answers

<span>a)      </span>Trusted third party

<span> <span>b)      </span>Symmetric Cryptography <span> <span>c)       </span>Algorithm <span> <span>d)      </span>Digital signature The answer is (D) Digital Signature It uses the private key of a sender and is a mathematical technique that validates the integrity and authenticity through a public key encryption of a digital or a software document. It is normally attached to digital or a software document to verify the sender’s identity and its content. </span></span></span>




5 0
3 years ago
Read 2 more answers
You must signal ___ before any turn or lance change ?
Alexeev081 [22]

Answer:

Your turning signal, or blinker

3 0
3 years ago
Read 2 more answers
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
Rasek [7]

Answer: (A) legal and ethical

Explanation:

 In the above given scenario, the liam's behaviors is consider as legal and ethical. The organization ethics is the morals of an association, and it is the means by which an association reacts to an inner or outside upgrade. Hierarchical morals is associated with the authoritative culture.

The ethical standard are basically depend on the human standards of good and bad and lawful guidelines depend on composed law, while moral norms depend on human rights and wrongs.

In the organization, the ethical and legal value are basically expressed by each employee as it is the regulatory law which is developed by the government for the particular organization to maintain the discipline.

3 0
4 years ago
Read Chapter 2 in your text before attempting this project. An employee is paid at a rate of $16.78 per hour for the first 40 ho
Vitek1552 [10]

Answer:

Answered below

Explanation:

#Answer is written in Python programming language

hrs = int(input("Enter hours worked for the week: "))

dep = int(input ("Enter number of dependants: "))

pay = 16.78

ovpay = pay * 1.5

if hrs <= 40:

wage = hrs * pay

else:

wage = hrs * ovpay

ss = wage * 0.06

fedtax = wage * 0.14

statetax = wage * 0.05

dues = 10

if dep >= 3:

ins = 35

net_pay = wage - ss - fedtax - statetax - dues - ins

print(wage)

print ( ss, fedtax, statetax, dues, ins)

print (net_pay)

8 0
3 years ago
What can a user modify on a business card using the Edit Business Card dialog box? Check all that apply.
vredina [299]

Answer:

layout,image,font,background color,

Explanation: i just did it on edge

7 0
3 years ago
Other questions:
  • Which one is correct?
    7·2 answers
  • Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
    8·1 answer
  • Which of the following is a correctly named cell?<br> B8<br> BB-8<br> 8-B<br> 8B
    11·1 answer
  • How do I retrieve the number from an old home phone? Someone called my home phone (it is not a cellular phone) and they did not
    7·1 answer
  • What will be displayed in the console when this program runs?
    15·1 answer
  • HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4<br><br>​
    14·1 answer
  • What is operating system​
    10·2 answers
  • Who developed the first personal computer called the altair
    15·1 answer
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
  • what statement about constructors is false? group of answer choices all constructors are passed a pointer argument constructors
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!