which are the four different methods of formatting text in libreoffice writer​

Answers

Answer 1

Answer:

The Text Formatting Bar that is displayed when the cursor is in a text object, such as a text frame or a drawing object, contains formatting and alignment commands.

if my answer helps you than mark me as brainliest.


Related Questions

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

Help me why did my desktop erase every app I need that please

Answers

Answer:

Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus

Answer:

your pc has virus

Explanation:

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

tiền tệ ra đời là kết quả

Answers

bruuh, wht is this man saying

Money was born as a result?

full form of ip ........?​

Answers

internet protocol - hope this helps!

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

if ur computer is runing slowly what is most likey to slove the problem

Answers

One way to solve this problem is if you clear up some storage space. On my computer things were running very slowly and I checked my storage and it was beyond full. Another way would be to clean up your hard drive, run some virus and malware scans as your computer may have some viruses that would be slowing it down. Some others ideas are to download more memory on your computer, install a faster hard drive, and reinstall or upgrade your operating system. I hope this helps!!
Reboot the device or clear your cache. Maybe it may need to go to a shop as well and get a few parts switched out

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Other Questions
p dng mt trong cc phng php qun tr cht lng phn tch thc trng cng tc qun tr cht lng ti mt t chc/doanh nghip c th. Who discovered X-rayDr.UM.BrahmachartLouis PasteurWilliam RontgenGB Fahrenheit What is the complete factorization of the polynomial below?x3 + 4x2 + 16x + 64 A building is 1 ft from an 8-ft fence thatsurrounds the property. A worker wantsto wash a window in the building 11 ftfrom the ground. He plans to place aladder over the fence so it rests againstthe building. (See the figure.) Hedecides he should place the ladder 8 ftfrom the fence for stability. To thenearest tenth of a foot, how long aladder will he need? A box of nine iPhone 5C cellphones (the iPhone for the colorful) contains two yellow cellphones and seven green cellphones. (a) If two cellphones are randomly selected from the box, without replacement (the first cellphone is not returned to the box after it is selected), what is the probability that both cellphones selected will be green? (b) If two cellphones are randomly selected from the box, without replacement (the first cellphone is not returned to the box after it is selected), what is the probability that there will be one yellow cellphone and one green cellphone selected? (c) If three cellphones are selected, with replacement (the first cellphones are returned to the box after it is selected), what is the probability that all three will be yellow? (d) If you were sampling with replacement (the first cellphone is returned to the box after it is selected), what would be the answers to (a) and (b)? 3 Name one geographic region that has few or no fossil primates and explain why. Plz answer fast! Tell the correct answer(both parts), or else I will report you. Simplify the following expression: 7(5 + 3) + 24 Find the length of AC again 1 A thing ring has a mass of 6kg and a radius of 20cm. calculate the rotational inertia. Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isnt useful to them. Which key issue mentioned in the textbook did Mario fail to consider? why do sun spots appear darker than their surroundings You are in charge of installing a remote access solution for your network. You decide you need a total of fourremote access servers to service all remote clients. Because remote clients might connect to any of the fourservers, you decide that each remote access server must enforce the exact same policies. You anticipate thatthe policies will change frequently.What should you do? (Select two. Each choice is a required part of the solution.)A. Configure network policies on the RADIUS server.B. Make each remote access server a member of the RemoteServers group.C. Configure the exact same network policies on each server.D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.E. Use Group Policy to configure network policies in the default Domain Controllers GPO.F. Configure each remote access server as a domain controller. Explique por qu un vaso de vidrio comn probablemente se romper se si se le llena parcialmente con agua hirviendo. if f(x) = 2x+2x-1, g(x) = x+5x+2 f(x)=g(x), find the value of x Should Aung San Suu KyiGive BackHer Nobel Peace Prize A shopkeeper marks the price of an article 25% above the cost price. Then he allows a discount of 10% of the marked price. Find the profit percentage. Final goods or services used to compute GDP refer to: the value of outstanding shares of stock of manufacturing firms. the value of outstanding shares of stock of manufacturing firms. the factors of production used to produce output. the factors of production used to produce output. goods and services at the final stage of production they have reached during the year. write two paragraphs to compare and contrast the narrators schools and explain how their schools shape their perspectives toward the hijab. Cite evidence from the text to support your ideas Put the verbs in brackets into the correct tense1 He talked about Denmark as though he had been. .. (be) there but we know he never has.2 She looks as if she .(be) really ill.3 It looks as though it ..(rain).4 She behaves as if she (be) in trouble.5 The weather here is so bad, it looks as though we .(have to) holiday abroad.6 It smells as if you .(put) lots of herbs in the stew.7 Maeve looked as though she .(have) little sleep thenight before, but she had gone to bed quite early.8 When he speaks, it sounds as if English (not be) his first language.9 She spoke about university as though she ..(spend) years there but in fact shed only spent a month there.10 I spoke to Simon last night and he sounded as though he. (be) really upset about something.11 She sounded as if she .(be) French.12 This sauce tastes as if you (put) too much pepper in it.13 My sister isnt rich but she spends money as though she .. (have) loads of it.14 She acts as though she ..(be) very confident, but in fact shes quite shy.15 She treats me as though I (be) her child.16 He talks about karate as if he (have) a black belt but we know hes only just started lessons.17 Little Tommy was trembling as though he .. (see) a ghost.18 She behaved as if nothing . (happen).19 When Moira broke off their relationship, John behaved as if the world (end).20 That woman looks as though she (faint). Bring her some water .