answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
2 years ago
11

Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.

Computers and Technology
1 answer:
Mars2501 [29]2 years ago
7 0

Answer:

1. The home tab

2. Font group

3. The small arrow at the bottom right of the font command group.

4. On "Font" heading (then "All text" subheading)

Explanation:

The following explanation will help Su in accomplishing her task.

1. Go to the home tab;

2. From the home tab, Su will have access to various command groups but in her case, she needs the Font command group.

3. There's a small arrow located at the bottom left of the font command group section; clicking on this arrow will open the font dialogue.

4. On the font dialogue, there are two headings. The "font" heading and the "character spacing" heading.

In her case, she needs the "Font" heading. The font heading also has various subheadings. To access the underline colour option, she needs the "All text" subheading.

See attachment for picture guide.

You might be interested in
Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
Neko [114]
The third one probably
5 0
2 years ago
Jail and prison officials may generally limit inmate rights when the limitations serve
qaws [65]
Prison or jail with understanding that after a period of time,she or he   may petition the court to be released on probation. ......the release of an inmate into a  community supervision program at the discretion of the parole board within limits set  by state or federal law.

 
4 0
2 years ago
Read 2 more answers
(a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
tia_tia [17]

Answer:

Check the explanation

Explanation:

(a)

# We need to try all options(TRUE/FALSE) of all the Variables

# to find the correct arrangement.

permutations <- permutate(0,1,n) [Find all permutions O(2^n)]

for permutation in permutations:

for X in variables:

if(permutation[i] == 1)

substitute(H,X,true)

else

substitute(H,X,false)

if(satisfiable(H)) return permutation

increment i

6 0
2 years ago
Assume that the following method header is for a method in class A. public void displayValue(int value) Assume that the followin
Diano4ka-milaya [45]

Answer:

int number = 100;

displayValue(number);

Explanation:

In order to call the method, we need to write its name and pass the parameters, if it has any.

The method public void displayValue(int value) takes one parameter, an integer value. Firstly, we need to initialize the value and, then call the method with that value as seen below.

int number = 100;

displayValue(number);

8 0
2 years ago
What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
pickupchik [31]

Answer:

"message encoding, message size and message delivery" are the correct answer for the above question.

Explanation:

The above defined are the three requirements which are defined as the protocol used in communication. These three requirements are a very essential part of communication because-

  1. Message Encoding is the first requirement, which is used to encode the message so that the hacker can not hack the communication data from the network.
  2. The second requirement is Message size which fixed the size and the number of packets used to send for the communication.
  3. The third requirements are Message delivery, for which the protocol needs to define the mechanism to overcome the loss of the data.

6 0
2 years ago
Other questions:
  • In three to five sentences, describe whether or not files should be deleted from your computer.
    13·2 answers
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • Mel is skilled in identifying the technical, economic, and organizational feasibility of software. In which phase of SDLC should
    13·1 answer
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • What text results in variable white space (blank) texts results In even white space
    9·1 answer
  • ___________is used for drawing 3D objects in the field of Science and Engineering.
    12·2 answers
  • 1. Used ____________ must be hot drained for 12 hours or crushed before disposal.
    15·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!