1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
11

When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.

Which keyboard combination could he use to make these changes at once?
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
6 0

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

You might be interested in
Simple question: what is bandwidth?
katen-ka-za [31]
The maximum amount of data transmitted over an internet connection in a given amount of time
8 0
3 years ago
Read 2 more answers
Ideally an entity identifier is composed of _____ attribute(s).
daser333 [38]
Entity identifier is composed of 4 attributes. It is used to determine the class of one entity. Each entity has its unique attributes. An identifying entity may use the below attributes:
1. date
2. title 
3. the complete address of the entity 
4. name of the performer

8 0
3 years ago
Localize the software problem and describe it<br>​
sweet [91]

Answer:

Do you have any idea how to get the best and most importantly I

5 0
3 years ago
Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe m
NeTakaya

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

8 0
3 years ago
Carol typed a memo to send to everyone in her department. To create this memo, she used a _____.
aleksley [76]

she used a word processor

8 0
4 years ago
Read 2 more answers
Other questions:
  • What problem does Mitra identify in education? How can the internet and social media influence this problem?
    14·1 answer
  • Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom
    14·1 answer
  • What are some examples for Environmental Technology?
    5·2 answers
  • A hierarchical addressing scheme is used
    15·1 answer
  • A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
    11·1 answer
  • In the scenario below, decide whether you should upgrade the computer or replace it. You’ve been working on your existing laptop
    12·1 answer
  • List three ways you can help somone who is being cyber bullied instead of just being a bustander​
    7·2 answers
  • The process of specifying that certain rows be displayed in the results of a query is known as selection. ______________________
    13·1 answer
  • A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
    12·1 answer
  • What software can be used for remote operation of a sunsdr2 dx?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!