1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
10

2 When you add text with the Text Tool, __________. the text is added to the current layer a new floating selection layer is cre

ated the text is added to every layer a new layer is created
Computers and Technology
1 answer:
Basile [38]3 years ago
8 0

Answer:

A new floating selection layer is created

Explanation:

In a graphic design software for example like CorelDraw, if  a text tool is used to add text, a new floating selection layer is created in which, the text is inserted.

You might be interested in
Consider this query:
vlabodo [156]

Answer:

There is a table in the database named Teacher having columns Email, Expiry Month etc. this query is selecting the email address from the table Teachers on the basis of expiry month that is February.\  

Explanation:

4 0
3 years ago
Finish the code to search for a 7 in the array.
guapka [62]

Answer:

The complete code is as follows:

from array import *

myArr = array('f',[3, 5, 7,3, 10])

location = myArr.index(7)

print(str("7")+" is at position "+str(location+1))

Explanation:

I made corrections to the third line of the code and I added a line

This line gets the index of 7 from the array myArr using the index keyword

location = myArr.index(7)

This line prints the position of the 7 in the array

print(str("7")+" is at position "+str(location+1))

8 0
3 years ago
If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
Alisiya [41]

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

4 0
3 years ago
Which output device would a teacher use to show a movie to the class? Check all of the boxes that apply.
zaharov [31]

Answer:

speaker and projector i think

Explanation:

4 0
3 years ago
Why the internet is not policed​
trapecia [35]

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

4 0
3 years ago
Other questions:
  • The layout button is located in the ____ group on the home tab?
    14·1 answer
  • In addition to not parking where signs prohibit it, you should never park __________________.
    12·1 answer
  • What type of program would you use to create a personal budget?
    9·1 answer
  • HELP PLEASE!! WILL MARK FIRST AND MOST RELIABLE ANSWER BRAINLIEST!!~~~~What is the primary difference between sort and filter?
    10·1 answer
  • True or false
    13·1 answer
  • How is this fictional tex in the people could fly different from the nonfictional text​
    12·2 answers
  • A degree-constrained minimum spanning tree is a minimum spanning tree (MST) where the maximum vertex degree is limited to a cert
    14·1 answer
  • Which of the following transfer rates is the FASTEST?
    15·1 answer
  • Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
    15·1 answer
  • What is a method that deletes an item from a list using the item’s value?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!