1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
11

When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.

Which keyboard combination could he use to make these changes at once?
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
6 0

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

You might be interested in
An algorithm is a ________. a. simple thinking strategy for making decisions quickly and efficiently. b. testing method involvin
Vsevolod [243]

Answer:

d. methodical step-by-step procedure for solving problems.

Explanation:

It is a set of instructions or a step-by-step methodological approach or process that helps solve simple or complex problems. Let’s say you want to count the number of people in a hall. You can count them one at a time with your finger and count from 1. You can express this algorithm of counting the number of people in that hall in form of a mathematical or computer pseudo code.

6 0
3 years ago
Zoey has brought her computer in for servicing. When she dropped off her computer, she mentioned that her computer will sometime
galina1969 [7]

Answer:

Option (B) Overheated CPU

Explanation:

  • The above problems mentioned are due to the problem with the CPU.
  • Overheated CPU can result into freezing the computer and unexpected rebooting.
  • CPU stands for Central Processing Unit and is responsible for all the instabilities in the hardware parts of the computer.
  • So, option (b) is true.
  • A Network Card is responsible for connecting the computer to the internet. It also has other names like Ethernet Card. A bad Network Card results in problems with the internet and network connections but not the above problems. So, option (A) is false.
  • UPS is Uninterrupted Power Supply. It is an external power device to provide the power supply to the computers in case of emergencies to not shut down the computer instantaneously. The above problems are not likely to be the caused by the failed UPS. So, option (C) is false.
  • Drive is a hardware device to store information. It can be removable drive (optical drives like CDs, DVDs ) or non removable like ( Hard Disk Drive ). A failed drive results in problems with the storing information. The above problems are not associated with it. So, option (D) is also false.
6 0
3 years ago
Read 2 more answers
(display five messages) write a program that displays welcome to java five times.
Nitella [24]
<span>/** * * * Exercise 1.2 - Display Five Messages * */ public class Ex01_02 { public static void main(String[] args) { System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); } }</span>
4 0
3 years ago
Write two scnr.nextInt statements to get input values into birthMonth and birthYear. Then write a statement to output the month,
Firlakuza [10]

Answer:

Here is code in Java.

// import package

import java.util.*;

class Main

{   // main method of class

public static void main (String[] args) throws java.lang.Exception

{

   try{

       // variables to store the input

       int birthMonth,birthYear;

       // Scanner class object to read the input

       Scanner scnr=new Scanner(System.in);

       System.out.print("Please enter the birth month:");

       // read the birth month

       birthMonth=scnr.nextInt();

       System.out.print("Please enter the birth year:");

       // read the birth year

       birthYear=scnr.nextInt();

       // print the output

       System.out.println(birthMonth+"/"+birthYear+"\n");

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create two variables "birthMonth" & "birthYear" to store the birth month and birth year.Read the  values of both from user. Print the birth month and birth year separated by a slash("/").

Output:

Please enter the birth month:1                                                                                                

Please enter the birth year:2000                                                                                              

1/2000  

Please enter the birth month:5                                                                                                

Please enter the birth year:1950                                                                                              

5/1950  

7 0
3 years ago
When troubleshooting your BranchCache configurations, what specific commands will allow you to verify that all your clients are
beks73 [17]

Netsh branchcache show status all commands will allow you to verify that all your clients are using the same caching mode, caching is enabled, and the cache is not full.

d. netsh branchcache show status all

<u>Explanation:</u>

In network BranchCache is basically called optimizing band width in wide area network. End user has to check whether BranchCache is enabled or not. BranchCache is normally done windows server side for web server or application server or cloud technology. Network administer has to monitor the bandwidth usage and take necessary steps.

Network administrator monitors each client request and checks cache and do alternate source of or content management. Network administrator or end user will know by right click on administrative temple, computer configuration.

5 0
3 years ago
Other questions:
  • Write a method that returns a new array by eliminating the duplicate values in the array using the following method header: Publ
    6·1 answer
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • Does anyone know how to connect a nintendo switch to a laptop?
    10·2 answers
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • How do you distinguish between misrepresentation and embellishment of one’s professional accomplishments on a résumé? Provide an
    14·1 answer
  • A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than t
    12·1 answer
  • Can you answer this question?
    9·1 answer
  • 1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation bra
    8·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
  • Distributed databases and data warehouses would be considered which data model type?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!