1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
2 years ago
15

What are the 2 levels of formatting in a word document

Computers and Technology
1 answer:
goldfiish [28.3K]2 years ago
7 0

Answer:

Paragraph Styles and character formatting (font, color, etc.)

You might be interested in
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
3 years ago
An IT Manager is reviewing the company’s approach to data privacy for a new project. What can happen if the company does not col
photoshop1234 [79]

Answer:

The company might not be able to satisfy their customers

5 0
1 year ago
How do you open the two versions of internet explorer 10?
Crank
On which windows it's not hard just search it google i would help but i hadn't used computer since may
5 0
3 years ago
Graphics you can select to reinforce the goal of your document include ____.
Tanya [424]
The answer would be D all of the above.
8 0
3 years ago
)A linked chain whose last node is full is sometiems called an
VARVARA [1.3K]

Answer:C)circular linked chain

Explanation:Circular linked chain has the elements/components in  a sequence connect in a consecutive order  and the first and last components connected with each other, thus making a circular formation. Last nodes of the circular linked chain is lined with first node display that it can have data present in itself. Therefore, the correct option is option(c).

8 0
3 years ago
Other questions:
  • How does net neutrality affect consumers actovate in a a positive way?
    8·1 answer
  • A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco
    15·1 answer
  • HELP ASAP
    10·2 answers
  • Match the job description to the level of degree it requires.
    15·1 answer
  • Hey, how is everyone????????????????????????????????
    8·2 answers
  • • > Four 240-pin DDR3 SDRAM DIMM sockets arranged in two channels • > Support for DDR3 1600+ MHz, DDR3 1333 MHz, and DDR3
    14·1 answer
  • Suppose you are working in a computer lab during the work you are facing window failure or other technical issues.How you will s
    12·1 answer
  • Pls help I will mark you the brainliest
    9·2 answers
  • Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked w
    11·1 answer
  • Write a java program as follows Write a method called powOfTwo that takes an integer as parameter, computes, and outputs it’s sq
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!