1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
9

To specify your preferred colors, fonts, and effects for a document, which of the following should be done?

Computers and Technology
2 answers:
Irina-Kira [14]3 years ago
8 0

Answer: crest custom theme

Explanation:

Mashutka [201]3 years ago
8 0

Answer:

crest custom theme

Explanation:

You might be interested in
Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application
Arada [10]

import javax.swing.*;

import java.awt.*;

import java.awt.event.*;

public class JSandwich extends JFrame implements ItemListener {

 FlowLayout flow = new FlowLayout();

 JLabel companyName = new JLabel("Sublime Sandwich");

 JComboBox<String> mainBox = new JComboBox<String>();

 JLabel mainList = new JLabel("Main ingredient");

 JComboBox<String> breadBox = new JComboBox<String>();

 JLabel breadList = new JLabel("Breads");

 JTextField totPrice = new JTextField(10);

 int mainNum, breadNum;

 double[] mainPrices = {6.99, 7.99, 8.99};

 double sumPrice = mainPrices[0];

 double breadPrice = 0;

 double mainPrice = mainPrices[0];

 double[] breadPrices = {0, 0, 0};

 String output;

 public JSandwich() {

   // code here

 }

 public static void main(String[] arguments) {

   JSandwich sandframe = new JSandwich();

   sandframe.setSize(240, 200);

   sandframe.setVisible(true);

 }

 public void itemStateChanged(ItemEvent list) {

   //

 }

}

4 0
3 years ago
______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:
Ann [662]
The best answer is A, viruses.
5 0
3 years ago
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Pani-rosa [81]

Answer:

¹²³⁴⁵⁶⁷⁸⁹

Explanation:

4 0
4 years ago
Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
Troyanec [42]
Name = "Bob"
age = 50

print("The age of" , name , "is" , age)
7 0
4 years ago
Other questions:
  • When a user first authenticates with a Kerberos-based server, he/she will receive _________ Group of answer choices a ticket-gra
    10·1 answer
  • You are designing a distributed application for Azure. The application must securely integrate with on-premises servers. You nee
    13·2 answers
  • When 2 or more computers are connected it is called?
    14·1 answer
  • Dit View
    5·2 answers
  • A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses comm
    6·1 answer
  • Fallon is a new student on campus. Everywhere she goes, she is asked for her 12-digit student number. To memorize her new studen
    10·1 answer
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Give one reason why more people prefer to settle in areas of flat land than on steep slopes​
    8·2 answers
  • Write a program to
    5·1 answer
  • Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!