1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
9

A typeface, plus any special attributes applied to the text is called ________.

Computers and Technology
2 answers:
grandymaker [24]3 years ago
3 0

Answer:

I would like to say font but not sure

masha68 [24]3 years ago
3 0

Answer:

Font is the answer!

Explanation:

A presentation graphic is more of the design of the whole powerpoint. The slides pane just shows all of your slides in that presentation. Slide master is whatever that is but surely we now know and understand that the special design and characteristics of a message, in other words the different styles, is called the font.

You might be interested in
Select the correct answer. Which input device uses optical technology?
daser333 [38]

Answer:

barcode reader is the correct answer

8 0
3 years ago
What describes Accenture's approach to automation?
Mrrafil [7]
<h2>Answer:</h2>

<h2>intelligence - centered</h2>

<h2>Explanation:</h2>

I hope it helps you

4 0
2 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
How are the functions different and how do i determine the answer
worty [1.4K]

Answer:

this isn't a fair question...

you'll either get 2,3 or 4

not a nice question

3 0
3 years ago
Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the foote
Mkey [24]

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

Just did it, e2020

4 0
3 years ago
Other questions:
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    14·1 answer
  • Based on the passage​ and/or drawing on your prior​ knowledge, you realize that an HMO is​ what?
    9·1 answer
  • Frank lives in an area that experiences frequent thunderstorms. What precautionary measure should he adopt?
    5·1 answer
  • What are html documents also called?
    12·1 answer
  • A small business has suffered from a cyber attack, what could be the resultant damage​
    10·1 answer
  • Select the correct answer.
    13·2 answers
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100
    10·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • Plz hurry it’s timed
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!