1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
12

What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent

er of the slide?
guides
gridlines
ruler
border
Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
8 0

Answer: Grids are a set of static horizontal and vertical lines with several intersection points that appear when you enable them on the slide. They can be used to accurately place or position the objects to bring out the visual feel on a slide.

ioda3 years ago
5 0

Answer:

I think it's guides I did the exam and got gridlines wrong

Explanation:

You might be interested in
Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
GaryK [48]

Answer:B. Are used to create, organize, and manage databases

Explanation: Database management system (DBMS) is a computer software which is used to collect, analyse or evaluate and retrieve data from a database. It is essential to the flow of businesses or other activities of an organisation.

Examples of database management system softwares MICROSOFT ACCESS,FOXPRO,ORACLE etc all this are effective as it helps to manipulate the data structure,field names,the file formats etc.

3 0
3 years ago
What should I do when the computer doesn't display Korean?(They are all □□)
bogdanovich [222]

Answer:

I Think You Could Go To Settings And Change It

Explanation:

I Think This Helps

5 0
3 years ago
The use of technological advances in agriculture to increase harvests
BigorU [14]
Tractors,water works, plows, water in general
3 0
2 years ago
We use _____command to get data from the user? (python)
Genrish500 [490]

Answer:

INPUT

Explanation:

EXAMPLE PYTHON CODE

_______________________________________________________

INPUT CODE:

_______________________________________________________

foo = input('foo: ')#Have some text printed before the input field

bar = foo

print(bar)

_______________________________________________________

OUTPUT CODE:

_______________________________________________________

foo: Hello World!

Hello World!

>>> bar

'Hello World!'

>>>foo

'Hello World!'

5 0
3 years ago
Many web browsers include _____ tools to make it easier for designers to locate the source of a style that has been applied to a
larisa86 [58]

Answer:

Developer tools.

Explanation:

The main aim of developer tools to loading the HTML(hypertext markup language), CSS and JavaScript it describes how much time takes the page to load in the web browser.

The developer tools make the task easier for the designer to locate the source code which is applied to a specific page element.​We can easily see the source code of the particular website by using the Developer tools. So it makes the task easier for programmers and developers.

4 0
2 years ago
Other questions:
  • What setting in Word keeps single lines of a new
    15·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • The first idea for a communications network was called
    14·2 answers
  • Which of the following are benefits of designing a scalable system? Choose 3 options.
    15·1 answer
  • Which of the following transfer rates is the FASTEST?
    15·1 answer
  • A list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor.
    14·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!