1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
14

What are the 5 font/typography families

Computers and Technology
1 answer:
larisa [96]3 years ago
8 0

Answer:

Arial

Helvetica

Verdana

Calibri

Noto

Explanation:

You might be interested in
Five corporations own over 90 percent of the media in the US.<br> 1.True<br> 2.False
avanturin [10]
<span>Five corporations own over 90 percent of the media in the US : </span>1.True.

7 0
4 years ago
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
Three popular types of ____ are handheld computers, PDAs, smart phones.
m_a_m_a [10]

Answer:

portable media players, and digital cameras

Explanation:

4 0
3 years ago
How do is excel interpret data?
juin [17]

Explanation:

Once a spreadsheet has a data set stored within its cells, you can process the data. Excel cells can contain functions, formulas and references to other cells that allow you to glean insights in existing data sets, for example by performing calculations on them.

4 0
3 years ago
Which explanation best explains the importance of using encryption?
andrezito [222]

Answer:

can you pls type the answer choices in the comments

5 0
2 years ago
Other questions:
  • What is the difference between a router and a modem
    15·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
    5·1 answer
  • A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
    12·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • Block elements start a new line when rendering? (true or false)
    7·1 answer
  • Which of the following situations is least likely fair use
    6·2 answers
  • Nd the errors in the following sentences. Underline with a red colour for
    9·1 answer
  • The cpu understands instructions written in a binary machine language. <br> a. true <br> b. false
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!