when you start a new, blank document, you usually end up changing the font to arial 11.5 point. how can you make these settings the default for this and all future new documents?

Answers

Answer 1

The fonts setting can be change to default by following the mentioned steps.

1)opening the format menu,

2)after that, click Font,

3)then click the Font tab.

4)Make the needed changes that you want, and then click Default.

What is font?

A font is a set of printable or displayable text character s in a specific style and size.

These are the complete set of character like numbers, letters, and symbols/icon within a typeface, which is the design of the characters.

Hence, we can easily change the fonts setting to default.

Learn more about fonts here,

brainly.com/question/14934409

#SPJ1


Related Questions

Marie uses a CSS file to style the elements in her HTML document. What is the advantage of using an external CSS file to style HTML elements

Answers

The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

What is HTML element?

An HTML element is known to be an element that is said to be often defined by a start tag, its content, and an end tag.

Therefore, The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

Learn more about  HTML elements from

https://brainly.com/question/11569274

#SPJ1

Please create a new java package and class file for each problem. 1. Given the current array of numbers - [0,2,85,71,44,6,8,54,5,21], find the largest and smallest value in the unsorted array. 2. Given the current array of integers - [235,21,5,6,21,22,5,6,1,2,3], check if the array contains either 3 or 6. 3. Create an array which contains 20 integer values. Assign a ramdom value for each array element using a for loop . Find all duplicate interger values in an array

Answers

Answer:

¿Cómo se crear un objeto de una determinada clase en Java?

Para crear un objeto de una clase se usa la palabra reservada new. Por ejemplo, Rectangulo rect1=new Rectangulo(10, 20, 40, 80); new reserva espacio en memoria para los miembros dato y devuelve una referencia que se guarda en la variable rect1 del tipo Rectangulo que denominamos ahora objeto.

Explanation:

¿Cómo pasar un objeto de una clase a otra en Java?

Para clasificar un método de otra clase, necesitamos tener el objeto de esa clase. Aquí, tenemos una clase “Student” que tiene un método getName() . Accedemos a este método desde la segunda clase SimpleTesting usando el objeto de la clase Student

A spreadsheet program allows a user to _______. a. perform complicated calculations automatically b. deliver elegant presentation to a large audience easily c. organize, send, and retrieve e-mails quickly d. keep viruses from infecting their computers please select the best answer from the choices provided a b c d

Answers

Answer:

c

Explanation:

A____
interprets an audio or video signal and compresses it.
Codec
Frequency
Bit rate
RGB

Answers

Answer:

Codec

Explanation:

A codec (encoder/decoder) is a piece of hardware or software that interprets an audio or video signal and compresses it.

HOPE THIS HELPS AND HAVE A NICE DAY <3

A student made a model of isostasy by placing a block of wood in a beaker of water. what does the wooden block represent in the model?

a. a glacier
b. earth's crust
c. sea level
d. earth's mantle

Answers

The answer is B., Earth’s crust :)

Answer:

D) Earth's mantle

Explanation:

Why do small amounts of impurities have such a large effect in doping semiconductors?

Answers

Answer Because the band gap is so small for semiconductors, doping with small amounts of impurities can dramatically increase the conductivity of the material

True or False: An Intrusion Detection System (IDS) is generally a passive device that listens to network traffic and alerts an administrator when a potential problem is detected

Answers

Answer:

According to your question, I think it is true.

Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he sees that the computer is running windows and has open applications. he decides to preserve as much data as possible by capturing data in memory. what should carl perform

Answers

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")

can you identify one syntax error and one logic error in these lines? why do you think a programmer might have made the logic error?

Answers

Answer:

There is no indentation on the second line -  Python needs indentation for if statements to work

The if statement is incorrect - We want the if statement to check if a is greater than 10 not less than 10

A programmer might have made this error by confusing the less than and greater than signs

(I'm assuming this is python)

________ speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

Answers

↓Answer↓

In-database analytics speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

can I have some help?

Answers

Answer: String

Explanation: A int would be the for a number. A string is for word(s). Hope this helped!

Answer:

A is correct, it is widely used, and it also sounds good.

Explanation:

Strings are connected, such as coding and bricks. For example "A string of events." String is widely used in lots of subjects, including coding. It is also easy to spot.

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have

Answers

Based on the above scenario,  the type of network that you have is known as the  peer to peer network.

What is  peer-to-peer network?

In this network, all the host can give network resources to other hosts or a form of access to  resources located on other hosts, and each host is said to often be in charge of controlling access to all these resources.

Note that Polling is a media access way where one device gives permission to other devices to access the network and as such, Based on the above scenario,  the type of network that you have is known as the  peer to peer network.

Learn more about peer to peer network from

https://brainly.com/question/10571780

#SPJ1

Explain why the connection times out despite adding the 'permit' statement for the End_User network to the ACL.

Answers

The connection timed out despite adding the 'permit' statement for the End_User network to the ACL because permission to be granted access was denied.

What is ACL?

ACL is an acronym for access control list which is the list of permissions that are related to the computer system network.

When an End-User is denied access to a network even after obtaining a permit statement, is could be that the End-User system has not been added to the list.

Learn more about network here:

https://brainly.com/question/26956118

Which draws a line while moving the pen 30 steps to the right?
from turtle import*
o drawright(30)
o move(30)
oright(30)
o forward(30)

Answers

Answer:

forward(30)

Explanation:

the turtle.forward command will move the turtle to the right

Mark this question for review To answer this question, complete the lab using information below. Launch Lab You are setting up on a small network. The owner of the network has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while maintaining security for the Home-PC and Home-PC2 computers. In this lab, your task is to complete the following: Use the appropriate network components to connect the two computers to the new ISP. • Place the Ethernet router with firewall capabilities on the Workspace. • Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports. Use the AC to DC power adapter to plug in the device. • Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet. In this lab, the networking devices are preconfigured with the correct settings to make the connection to the internet service provider (ISP) and the internet.

Answers

The appropriate network components steps to take to connect the two computers to the new ISP is given below.

What is the network components  about?

In carryout the above task, the first thing to do is click the Shelf, and widen the Networking Devices.

Other steps are:

Take the Ethernet router and firewall to the Workspace.Beyond the router, Click on Back to switch and change to the back view.Beyond the switch, Click on Back to switch to change to back view of the switch.Beyond the cable modem, change by clicking on Back to switch to the back view as seen on the cable modem.

Later on click  on the Ethernet cable as found on the third switch port and then extend it to an open Ethernet LAN port on the router to link up the Home-PC down to the router.

Click also on the Ethernet cable as seen the third switch port and then take it also  to an open Ethernet LAN port as seen on the router to link up the second Home-PC to the router.

Then also click on the last Ethernet cable on the switch and extend (drag) it to the open Ethernet WAN port as seen on the router to link up the router to the internet service.

Then click the Ethernet cable on the cable modem and extend it to a single of the RJ45 ports that can be found by going to the wall plate.

Make sure to select the DC power connector that can be seen on the switch and extend it to the power port seen on the router so that one can plug in the router.

Looking at the Home-PC, select to view Windows 10 to see if the system is properly linked to the network and also the internet.

Go to the notification aspect and the select the Network icon and click on the tool called Open Network and Sharing Center.

Lastly, One can know if the connection to Home-PC2 is working by clicking on bench as seen in the top menu, and then select to see Windows 10 to know if it is well linked to the network and internet and also follow the notification steps above.

Learn more about  network components from

https://brainly.com/question/20535662

#SPJ4

Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia

Answers

The type of computer application which apple keynote is, is: c. presentation.

What is a presentation application?

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.

This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.

Read more on presentation application here: https://brainly.com/question/26404012

#SPJ4

You can click the tabs at the bottom of a workbook to switch between.

Answers

Notes or screens? I think

what is UTP in terms of network​

Answers

Answer: Unshielded bent match (UTP) could be a omnipresent sort of copper cabling utilized in phone wiring and neighborhood region systems (LANs). There are five sorts of UTP cables recognized with the prefix CAT, as in category each supporting a distinctive sum of transfer speed.

Explanation:

To ensure you don't forget your password, you should use one unique and safe password for all your accounts. a) True b) False

Answers

The answer is False you shouldn’t do that!

how many questions are on the ap computer science principles test

Answers

Answer:
70.

Explanation:
The 2021 AP Computer Science Principles Exam is 2 hours long and includes approximately 70 multiple-choice questions. There will be three types of questions: Single-select questions (57 questions).

Hope this help’s!
Please give Brainliest!

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

Describe the shorthand representation of the structure of a relational database. Why is it important to be able to represent the structure of a database in a shorthand fashion

Answers

The  shorthand representation is used to depict the database table in an easier way or manner.

What is the shorthand representation?

A symbol is known to be a kind of shorthand representation for the object of a specific structure.

Note that the shorthand representation is used to depict the database table in an easier way or manner. as one can be able to do things easily because there is a short cut.

It is known to tell or address the Database table in a simple and reasonable way with ease of utilization.

Learn more about Database from

https://brainly.com/question/26096799

#SPJ1

Describe the ideal environment for a computer to work properly

Answers

The ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

What is a computer?

Computer is an electronic device, that perform various of tasks easily that take humans much time.

It is a machine on which we can work and contains a screen and operators, like keyboard and mouse.

Thus, the ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

Learn more about computer

https://brainly.com/question/21080395

#SPJ1

Choose the missing term.

___ time

time.sleep(3)

1.form
2.insert
3.import

Answers

Answer:

import

Explanation:

the import keyword is used to import external modules into a python script.

what special problems can occur with wireless networks

Answers

Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity. Piggybacking, if you fail to secure your wireless network, anyone with a wireless-enabled computer in range of your access point can use your connection. Network congestion, Routers or other network equipment are overloaded with too much traffic. Speed Mismatch. This occurs when multiple users try to make use of the same server. I could go on and on.

Hope this helps!
Please give Brainliest!

The concept of pirate radio led to the use of an online tool in which:

OA. music can be streamed or experienced online the instant it is captured.
B. musicians can adjust notes that are out of tune to make them sound better.

OC. artists can share news and concert dates with their current and future fans.

OD. friends can share audio or video files with other people on the Internet.

Answers

The concept of pirate radio led to the use of an online tool in which: A. music can be streamed or experienced online the instant it is captured.

What is a pirate radio?

Pirate radio can be defined as an illegal and unlicensed radio broadcast station that receives unauthorized communication signals across borders. Also, the transmission technique, mode, and power used by pirate radio were unauthorized.

Consequently, the concept of pirate radio led to the use of an online tool called "live streaming" in which music can be streamed or experienced online the instant it is captured.

Read more on pirate radio here: https://brainly.com/question/16724264

#SPJ1

You will participate in a Discussion Board with your peers to express your ideas on the unit topics. In this Discussion Board, prepare a post based on the following.

After reviewing your work for Unique Physique, the owner would like your input regarding the future of the company. In two or more paragraphs, provide your thoughts on the trends and forecasts possibilities for the gym. Also, discuss the benefits of producing the flyer for the business, what affects the presentation will have on the business, and which products can be expanded to increase profits.

Respond thoughtfully, then comment on some of the entries of your classmates. Be respectful to others. Refer to the Discussion Rubric for guidance.

Answers

The current trends and forecasts possibilities for the gym are:

Home exercise gym. .Strength training that is made up of free weights.Personal Training, etc.

What is the future of fitness?

Exercise, health and wellness  is one that is often been transformed and as such, gyms providers of fitness need to upgrade themselves both inside and outside their walls and thus make a change that can reach new customers.

Note therefore,  The current trends and forecasts possibilities for the gym are:

Home exercise gym. .Strength training that is made up of free weights.Personal Training, etc.

Learn more about gym from

https://brainly.com/question/1365564

#SPJ1

Because of the Patriot Act of 2001, law enforcement officials:

OA. can access your email
activity more easily.

OB. must periodically check your online activity.

OC. are not authorized to monitor your emails.

OD. need permission to view your text messages.

Answers

Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity.

What is the role of Patriot Act ?

The USA Patriot Act is known to be an Act that hinders and punishes terrorist attacks that is done in any part of the United States and abroad via enhanced law enforcement and others.

Therefore, Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity to see if there is threat to national security.

Learn more about Patriot Act from

https://brainly.com/question/25741451

#SPJ1

Answer:

A, can access your email activity more easily

Explanation:

Trust me its correct

How do you access a sample credit report and credit score? Once you have your credit report
and credit score, how do you go about interpreting them? What components are included in a
credit report?

Answers

Answer:

only good knows the answer son

Explanation:

Who completes the action item form in a team meeting

Time keeper
Scribe
Recorder
Team leader
Gate keeper

Answers

Answer:

Recorder

Hope this helped! I'm not 100% if this answer is correct, though

Recorder completes the action item form in a team meeting. Thus, option C is correct.

Who is a Team Leader?

Team Leader refers to a person that is in charge of a group of people and helps them to achieve a common goal. Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

A team leader can be found in the army as a General, in business industries, and even a president can be referred to as a team leader.The Gate Keeper is typically a role that is assigned to a person who is responsible for ensuring that the meeting runs smoothly and productively.

The Gate Keeper's primary responsibility is to manage the flow of information and ensure that all participants have an opportunity to contribute and that the meeting stays on track.

Therefore, Recorder completes the action item form in a team meeting. Thus, option C is correct.

Learn more about Recorder on:

https://brainly.com/question/31388398

#SPJ2

Other Questions
Why was the time periodfollowing the Civil Waroften called the "GildedAge"?A. Things looked good or "gilded" onthe outside even though theyweren't very good underneath.B. Many people became apprenticesand joined guilds for differenttrades.C. It was a productive, prosperoustime for everyone.D. Every new building after the CivilWar was gilded with gold trim,showing the new prosperity. Need help as asap emergency The Quarter in Atlantic City attempts to recreate the architecture and atmosphere of which famous Cuban establishment? Group of answer choices The Malecn Old Havana Tropicana El Capitolio Can someone please help me with this 2. The bases of the trapezisid (x-14) cm and (x+2) cm ats medien is 30 cm long, how long is the shorter base Help me pleaseeeeeeeee denny's average heart rate is 120 beats per minute what is the ratio of his heart beats per minute with heart beat per second? hey guys. question posted in the picture. will award brainliest. A 26-inch skateboard leans against a wall making a 39angle with the ground Some help with question 6 Nolan wants to raise money to participate in a cancer fundraiser walk. He sets the following goal for himself: I will earn $600.000 for the cancer fundraiser by asking for donations. Please describe the effectiveness of Nolan's goal in two to three complete sentences using the MAD goals concept. does C supports STRINGS as a data type? Why does Uncle Henrik decide to tell Annemarie about the hiding place in his boat? Read the message below from the Russian tsar to his cousin, the German kaiser. An ignoble [not noble] war has been declared to a weak country. The indignation [outrage] in Russia shared fully by me is enormous. I foresee that very soon I shall be overwhelmed by the pressure forced upon me and be forced to take extreme measures which will lead to war. To try and avoid such a calamity as a European war I beg you in the name of our old friendship to do what you can to stop your allies from going too far. - Telegram from Tsar Nicholas II to German Kaiser Wilhelm II, 1914 Which of the following best describes the tsars message? He worries that the coming war will be blamed on Russia. He believes that warfare is immoral. He complains about the pressures he is facing from Britain for war. He fears Russia will be forced into war by forces outside his control. Which phrase from the excerpt is the best example of nonstandard english? claimed that she had been cow kicking her from behind was an ironing board things throwed at it Help for all for 25 points and brainlist what are dreams ?!! if anyone could give me the answers to all of these it would rlly help alot A new website received 1700 hits within 10 hours of going live what is the maximum number of hits it might receive in 24 hours if this triend continues? What is 5 3/5% of 750?Thanks in advance.