1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
2 years ago
8

How do you open the Font dialog?​

Computers and Technology
1 answer:
Simora [160]2 years ago
6 0

Explanation:

Click the Home tab.

In the Fonts group, click the dialog box launcher button.

The button is found in the lower-right corner of the Font group.

The Font dialog box contains all the commands for formatting text, including quite a few that didn’t find their way into the Font group on the Ribbon. As with all text formatting, the commands you choose in the Font dialog box affect any new text you type or any selected text in your document.

When you’ve finished setting up your font stuff, click the OK button. Or click Cancel if you’re just visiting.

Use the Ctrl+D keyboard shortcut to quickly summon the Font dialog box.

hope my answer helps

pls mark this as brainlist

be sure to follow me and I will follow you back

stay safe

good day

You might be interested in
the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
marta [7]
A. the modem provides the wifi or internet to the computer
6 0
3 years ago
Read 2 more answers
Implement the following logic in C++, Use appropriate data types. Data types are represented as either numeric (num) or string.
ICE Princess25 [194]

Answer:

Follows are the modified code in c++ language:

#include<iostream>//header file

#include<string>//header file

using namespace std;

int main()//main method

{

string name,address, MSG_YES, MSG_NO;//defining string variable

int item,quantity,size=6, i=0;//defining integer variable

double price;//defining double variable  

int VALID_ITEM[]={106,108,307,405,457,688};//defining integer array and assign value

double VALID_ITEM_PRICE[]={0.59,0.99,4.50,15.99,17.50,39.00};//defining double array and assign value

bool foundIt=false;//defining bool variable  

MSG_YES="Item available";//use string variable to assign value

MSG_NO = "Item not found"; //use string variable to assign value

cout<<"Input name: ";//print message

cin>>name;//input value in string variable

cout<<"Input Address: ";//print message

cin>>address;//input value in string variable

cout<<"Input Item: "<<endl;//print message

cin>>item;//input value in string variable

cout<<"Input Quantity: "<<endl;//print message

cin>>quantity;//input value in string variable

while(i <size)//defining while that checks i less then size  

{

if (item ==VALID_ITEM[i]) //use if block to match item in double array

{

foundIt = true;//change bool variable value

price = VALID_ITEM_PRICE[i];//hold item price value in price variable  

}

i++;//increment the value of i

}

if (foundIt == true)//use if to check bool variable value equal to true

{

cout<<MSG_YES<<endl;//print value

cout<<"Quantity "<<quantity<<" at "<<"Price "<<price<<"each"<<endl;//print value

cout<<"Total"<<quantity*price;//calculate the total value

}

else//else block

cout<<MSG_NO;//print message  

}

Output:

please find the attached file.

Explanation:

In the above given C++ language modified code, four-string variable " name, address, MSG_YES, and MSG_NO", four integer variable "item, quantity, size, and i", and "integer and double" array is defined, that holds values.

In the string and integer variable "name, address, and item, quantity", we input value from the user-end and use the while loop, which uses the if block to check the "item and quantity" value from the user end and print its respective value.

6 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Alice is an investor who has created a device controlled by an app that will water plants automatically. Alice has no experience
oksian1 [2.3K]

Answer:

3rd one

Explanation:

took test

5 0
3 years ago
The light you shoot in will dictate what shutter speeds to use.
Nesterboy [21]

Answer:

The three things that will determine your exposure are film speed, aperture and shutter speed. The speed of the film dictates how much light the film needs. The aperture controls how much light comes through the lens. And the shutter speed then controls how much of that light hits the film. These three things always work together to produce your image.

The shutter speed, sometimes known as exposure time, determines the amount of time your film is exposed to light when taking a photograph. So, you always need to balance your aperture and shutter speed to get a correct exposure.

The general rule is you need to shoot with at least 1/60 to get sharp images when shooting handheld. It is best to use a tripod if you want to shoot with a slower exposure time as this will help reduce any camera shake.

Fast Shutter

Fast speeds are really good for freezing fast-moving subjects. You need to make sure you are using a fast exposure time if you are trying to take a sharp image of a fast subject. Different cameras have different options but commonly you can choose something like 1/500.

Higher ISO film will also allow you to utilise the faster shutter speeds as they are more sensitive to light.

Slow Shutter

Slow shutter speeds will visibly record motion. They are often used to create the effect of motion in an image. A moving subject captured with a slow exposure time will be captured as a blur across the image. Slow exposure times are also necessary when taking photos at night. They allow you to get enough light to expose your image correctly.

Be careful when using slow exposures without a tripod. The slower the shutter the more likely that you will have visible camera shake in the image.

Reading Shutter Speeds

Shutter speed is measured in fractions of a second. So, for example, 1/60 is read as one-sixtieth of a second. The bigger the second number in the faster the speed.

Typical shutter speeds you will see are; 1, 1/2, 1/4, 1/8, 1/15, 1/30, 1/60, 1/125, 1/250 and 1/500.

You might also be interested in our Guide to Aperture and Guide to Film Speed

If you’re new to film then read our Beginners Guide To Film Photography. And if you want some help picking out your first roll then read Choose Your Film, it will give you a good idea of the options you have.

Explore

News • Guides • Community • Film Reviews • Film Developing Times • Choose Your Film

GUIDE TO APERTURE

GUIDE TO FILM SPEED

SHOP FILM

Share:

. . .

Terms and Conditions / Privacy Policy / Cookie Policy / © 2021 Parallax Photographic Coop

Explanation:

please mark me brainliest

3 0
3 years ago
Other questions:
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    14·2 answers
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • Professional photographers often use the lowest quality settings on their cameras since this can be reversed in Photoshop.
    7·2 answers
  • What are the seven internal compontents of a computer
    10·1 answer
  • What are some good electronics that I can buy on Amazon?
    14·1 answer
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • Lesson 2.7 Code Practice #2
    13·1 answer
  • Can you explain the difference between software and hardware? Tell me 3 examples of each one.
    10·1 answer
  • A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learne
    8·1 answer
  • Select the WRONG statement about Slide Transitions.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!