Which feature allows you to copy attributes of
selected text and apply them to another
selection?

Answers

Answer 1
I’m not sure if this is a more in depth question but this sounds like the feature “copy and paste”?
Answer 2

The feature allows you to copy attributes of selected text and apply them to another selection is format painter.

Which strategies can you operate to transport textual content from one a part of the record to any other?

Select the texts you need to transport to any other place, after which press the shortcut key “Ctrl + X” to do a cut. Move your cursor in which you need the texts to go, after which paste it in via way of means of urgent shortcut key “Ctrl + V”.

The layout painter helps you to reproduce all the formatting from one item and use it on any other one – consider it as copying and pasting for formatting. Select the textual content or photograph that has the formatting which you need to produce.

Read more about the formatting :

https://brainly.com/question/3653791

#SPJ2


Related Questions

A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his first month with the company. He needs an easy way to disconnect and reconnect all his peripheral devices to his old laptop. Devices include two external monitors (one HDMI, one DVI), a USB wireless mouse, USB wireless keyboard, Ethernet network, USB printer, headphones, and microphone. He has a budget of $100. What kind of device would best suit his needs

Answers

Answer:

usb-c hub

Explanation:

In this specific scenario, his best option would be a usb-c hub. This is a fairly cheap device which he can get one of many variations for less than $100. This device connects through a single USB-C port on the computer and has multiple USB ports on the hub. This allows you to connect all of your devices to the hub and connect/disconnect all of them instantly from the single USB-C cable connected to the laptop. Thanks to the new USB-C technology these hubs now usually include both HDMI and DVI inputs.

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations

Answers

Answer: Identifying sequences

Explanation:

Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.

In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.

Therefore, the best option is B.

escribe un texto argumentativo donde expreses tu opinión acerca del acoso cibernético ​

Answers

Respuesta:
El acoso cibernético es uno de los problemas menos tratados por la sociedad y a la vez uno muy recurrente. Este tipo de acoso rastrea a la persona a través de redes sociales y la investiga con fines degradantes para el afectado, sin embargo, para prevenir este se deben tomar medidas de seguridad como no compartir toda tu vida en el internet y así evitar estos casos que generalmente terminan con abuso sexual o secuestro.

four example of computer software?​

Answers

answer= safari, ms-word, moviemaker, ms-paint, firefox,etc...

How can the Column settings be accessed?

Layout tab, Page Setup group
Layout tab, Paragraph group
Layout tab, Arrange group
Design tab, Document Formatting group

Answers

Your answer would be LAYOUT TAB, PAGE SETUP OR GROUP

A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery

Answers

Answer: $700

Explanation:

Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.

In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.

can someone please tell me the name of some of the best driving simulator games?​

Answers

Answer:

Editor's Pick: Assetto Corsa. Assetto Corsa is a highly regarded racing game with a realistic force feedback feel.

Project Cars 2.

Gran Turismo Sport.

F1 2019.

Dirt Rally.

Explanation:

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

Candidates resume shows his way of presenting and organizing.

Explanation:

Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume.  The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc.  But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.

Information Technology Question

What is the best topic in Information Technology ever?.​

Answers

Answer:

I don't know about others but I like Binary

Answer:

Explanation:

5 Key Actions for IT Leaders for Effective Decision Making

Progressive leaders reengineer data and analytics to turn decision making into a competitive advantage.

This Gartner eBook shows you the power and potential of reengineered decision making and guides you to:

Identify what decisions to reengineer, and why

Prioritize decisions, analytics and data

Fit artificial intelligence into decision making

Rethink your D&A architecture

Build skills, habits and teams geared for effective decision making

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

if (accountBalance < 1000.00):
print(“SAVINGS3”)
elif (accountBalance < 2000.00):
print(“SAVINGS2”)
elif (accountBalance < 3000.00):
print(“SAVINGS1”)
else:
print(“SAVINGS”)

Answers

Answer:

See explanation

Explanation:

Given

The code segment

Required

The output

The code segment is incomplete, as the value of accountBalance is not given.

However, I will explain the given segment using few illustrations.

The following will be executed if accountBalance is less than 1000.00

if (accountBalance < 1000.00):

   print(“SAVINGS3”)

Take for instance:

accountBalance = 500.0; "SAVINGS3" will be printed

The following will be executed if accountBalance is less than 2000.00 but more than or equal to 1000.00

elif (accountBalance < 2000.00):

   print(“SAVINGS2”)  

Take for instance:

accountBalance = 1500.0; "SAVINGS2" will be printed

The following will be executed if accountBalance is less than 3000.00 but more than or equal to 2000.00

elif (accountBalance < 3000.00):

    print(“SAVINGS1”)

Take for instance:

accountBalance = 2500.0; "SAVINGS3" will be printed

Lastly, if accountBalance is 3000.00 or greater, the following will be executed

else:

   print(“SAVINGS”)

Take for instance:

accountBalance = 3500.0; "SAVINGS" will be printed

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hotspot but is still unable to connect to the internet.What is the cause of the issue?

Answers

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

Pls help me this quation give me the answer Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why?

Answers

Answer:

yes, in case of big data demand it's duty of person as well as company to follow ethical principal and adhere the moral standard for keeping the information of the big data company confidential.

Explanation:

may it's help you

An insurance company utilizes SAP HANA for its day-to-day ERP operations. Since they can’t migrate this database due to customer preferences, they need to integrate it with the current AWS workload in the VPC in which they are required to establish a site-to-site VPN connection. What needs to be configured outside of the VPC for them to have a successful site-to-site VPN connection?

Answers

Answer: An Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network

Explanation:

Based on the information given, an Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network need to be configured outside of the VPC for them to have a successful site-to-site VPN connection.

The Internet-routable IP address will be used in the identificatiob of each computer through the use of the Internet Protocol for the communication over a network.

Sue follows these steps to create a chart in her presentation.
Step 1: Navigate to the Insert tab.
Step 2: Click the Chart button in the Illustrations command group.
Step 3: Choose the column chart.
Step 4: Click OK.
Which objects appear on the slide after she clicks OK? Check all that apply.
a fully completed table
a fully completed chart
a table with blank values
a chart with blank values
a table with sample values
a chart with sample values

Answers

Answer:

A chart with sample values

Answer:

A table with sample values

A chart with sample values

Explanation:

The HTML tag for the smallest heading is​ what

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system

Answers

Answer:

Question 1. B) False

Question 2. B) False

Question 3. A) True

Question 4.

a) Looking ahead

b) Lookout for hazards

c) Focus on the big picture

d) Ensure visibility of her or his vehicle

e) Always have an exit route for safety

Explanation:

Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road

Therefore, the correct option is B) False

Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based

Therefore, the correct option is B) False

Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view

Therefore, the correct option is A) True

Question 4. Effective space management is implemented by a driver through;

a) Looking ahead of the vehicles n front

b) Maintaining constant lookout for hazards

c) Ensure that the big picture is in focus

d) Ensure that the vehicle he or she is driving can be seen

e) Ensure that an escape route is always available

Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"

Answers

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

#It helps in the proper function ing of computer hardware.
1 Application Software
2Users
3 hardware software
4 system software

#_____is designed to solve a specific problem or to do a specific task
1 Application Software
2 System software
3 utility Software
4 user

#Set of programs which can sit of full set of document is termed as:
1 Database package
2 file package
3 bus package
4 Software package


#Translator for low level programming language were termed as:
1 Assembler
2 Compiler
3 Linker
4 Interpreter

#What is the name of a utility that protects your computer against downloading malicious code:
1 file compassion program
2 antivirus program
3 backup program
4 troubleshooting program

Answers

4- system software
2- application software
4- software package
1- assembler
2- antivirus program

Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE

Answers

Group of answer choices.

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

B. Rachel should reset her machine to store data using hexadecimal values instead of binary.

C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.

D. Rachel does not have to worry about the size of the numbers

Answer:

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

Explanation:

In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.

Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.

For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.

In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.

How to save a file for the first time?​

Answers

Answer:

i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it

list three social implications of the wider range of piracy​

Answers

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)

Answers

Answer:

Following are the differences two the given questions:

Explanation:

DVD-R:

DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.

DVD-RAM:

This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.

what is local technology ? give examples​

Answers

Answer:

the technologynwhich is used in our locality os calleg local technology

ex. biogas farm , modern methods of 1transport etc

list out the application of the computer and explain it?(and as the answer for this question as image) ​

Answers

Answer:

There are several applications of the computer; some of these applications are:

Word processorsGraphics applicationsWeb browsersGamingMedia playersAlarms and tasks schedulersEtc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

My explanation could not be submitted; so, I added it as an attachment.

power point is hardware or software​

Answers

Answer:

PowerPoint is the standard forms of software platform. It contains the CPU, memory, expansion slots and all the controllers required to control standard hardware devices.

Answer:

Software

Explanation:

because it's a computer software created by Microsoft which allows the user to create slides for the users.

grow a sentence frame a small and simple sentence. then expand it. Expand this sentence -I am a gril​

Answers

Answer:

I am a young lady.

Explanation:

simply sentence or expand more:

I am a young lady in my teens. ​I am a young woman in her twenties. ​I am a twenty-year-old lady who is just starting off in life. ​I am a twenty-year-old woman who is just getting her feet wet in the world. ​

Answer:

I am a girl, I love playing games, but before that, I will finish my homework first.

~~~~~~~~~~~~~~~~~~~~

Hope it helps!

#CarryOnLearning

[tex]Park \: Sun-min[/tex]

What is difference between base font and font tags​

Answers

Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.

#LETS STUDY#BRAINLEST LOVE❣️

Other Questions
The enzymes catalase and malate dehydrogenase are both classified as oxidoreductases. Catalase has a heme group present at its catalytic site, whereas malate dehydrogenase has no bound cofactors or prosthetic groups and uses NAD as a coenzyme. What can you infer about these two enzymes What numbers are to the right of 0 on the number line? If you tethered a space station to the earth by a long cable, you could get to space in an elevator that rides up the cable much simpler and cheaper than riding to space on a rocket. There's one big problem, however: There is no way to create a cable that is long enough. The cable would need to reach 36,000 km upward, to the height where a satellite orbits at the same speed as the earth rotates; a cable this long made of ordinary materials couldn't even support its own weight. Consider a steel cable suspended from a point high above the earth. The stress in the cable is highest at the top; it must support the weight of cable below it.What is the greatest length the cable could have without failing? A merchant sued a company for breach of contract, alleging that the products she purchased failed to conform to contract specifications. Shortly before the trial was to begin, the merchant suffered a stroke that left her paralyzed and virtually unable to communicate. Her guardian was properly substituted as the plaintiff in the lawsuit. At trial, following presentation of the plaintiff's case, the company calls as a witness a priest to question him about a conversation he had with the merchant at a church fundraiser. In this conversation, the merchant told the priest in confidence that the products she received were actually quite functional, but that she had become aware of a lower price being offered by another vendor, and thus wanted to get out of her contract with the company. The plaintiff's attorney immediately objects on the basis of clergy-penitent privilege. How should the court rule on the objection Medical profession is a very sensitive profession.Do U agree?Give 5 reason what is the tone in "the man in the arena" by By Theodore Roosevelt Calculate the number of 12 V batteries (capacity 120 Ah) needed to run a 3 kW DC motor that operates in 240 V. How many hours the motor will run with 20 of such batteries connected in series? The tempteture falls from 11 degrees to -2 degrees how much degres fell You go to the doctor and he gives you 11 milligrams of radioactive dye. After 24 minutes, 6.75 milligrams of dye remain in your system. To leave the doctor's office, you must pass through a radiation detector without sounding the alarm. If the detector will sound the alarm if more than 2 milligrams of the dye are in your system, how long will your visit to the doctor take, assuming you were given the dye as soon as you arrived? Give your answer to the nearest minute. You will spend minutes at the doctor's office. I operate a small convenience store. Typically, from 10 am to 11 am, I get 23 customers. What is the standard deviation of the number of customers that might check out between 10.15 am and 10.30 am Bud bought 2 kissing fish for $4.75 each. He bought a small aquarium for$19.95. How much did Bud spend? What is the answer NEED HEELLLLPPPPPP!! Can someone help me with this math homework please! Two workers finished a job in 12 days. How long would it take each worker to do the job by himself if one of the workers needs 10 more days to finish the job than the other worker which is the capital of kushans? Let X be an exponential r.v. with mean 6 and Y be an uniform r.v. over [4, 10] independent of X. Find the variance of 2X+3Y. Which of the following is not organic compound? a. CH4 b. H2CO3 c. CCl4 d. CH3-OH Write an editorial to a local newspaper on the topic 'importance of skilled human resource for development' When you are reviewing another student's essay, what should you do when you think they've done a good job on something?Use the same technique in your own essay.Focus instead on what they did wrong.Include a note that applauds their work.Keep it to yourself so they don't get prideful. You are driving environment change each time you get behind the wheel weather Road conditions your vehicle and other drivers are