Jose would like to have text with predefined styles that can flow around an image in a variety of shapes and sizes
Which object should he insert into his document?

WordArt

SmartArt

shapes

images

Answers

Answer 1

Answer:

A) WordArt

Explanation:

WordArt can be set to the predefined styles within Word and can be set to flow and wrap around images in word.

Answer 2

Answer:

Word art

Explanation:


Related Questions

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network

Answers

Answer:

RIP

Explanation:

RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.

Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.

Which examples demonstrate common education and qualifications for Manufacturing Production Process Development careers? Check all that apply. Answer: A. Hugo uses CAD software to create a product design. D. Latisha is a Mechanical Engineer with a bachelor's degree. E. Oliver carefully calculates the dimensions of a product.

Answers

Answer:

A D E

Explanation:

I got it right on Edge.

Answer:

A D E

Explanation:

just did the work

:)))))

What do you mean by word-wrap?

Answers

Answer:

it is also know as line breaking

Explanation:

is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

put each sentence in the correct place please :)

Answers

the first image matches with the last sentence.

the second image (fireworks) match with the first sentence.

the third image (rocket) matches with sentence two.

and the last image matches the third sentence.

Answer:

sentence 1 -> picture in box 2

sentence 2 -> picture in box 3

sentence 3 -> picture in box 4

sentence 4 -> picture in box 1

8.10 Code Practice Question 3

Can someone please help cause this has me lost I took a picture of the question because that would be too much to try and type.

I’m sorry if the quality is bad I tried to get a good angle!

Answers

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic",

        "Reliability"]

def swap(arr, in1, in2):

   w = arr[in1]

   arr[in1] = arr[in2]

   arr[in2] = w

print(terms)

swap(terms, 5, 1)

swap(terms, 2, 4)

swap(terms, 3, 5)

swap(terms, 5, 6)

swap(terms, 6, 8)

swap(terms, 8, 9)

print(terms)

This is how I interpreted the question. If I need to make any changes, I'll do my best. Hope this helps though.

The program is an illustration of lists and list manipulation

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This defines the swap function

def swap(arr, pos1, pos2):

    myList = arr[pos1]

    arr[pos1] = arr[pos2]

   arr[pos2] = myList    

#This initializes the list

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic", "Reliability"]

#This prints the list elements

print(terms)

#This swaps the second and the sixth list elements

swap(terms, 5, 1)

#This swaps the third and the fifth list elements

swap(terms, 2, 4)

#This swaps the fourth and the sixth list elements

swap(terms, 3, 5)

#This swaps the sixth and the seventh list elements

swap(terms, 5, 6)

#This swaps the seventh and the ninth list elements

swap(terms, 6, 8)

#This swaps the ninth and the tenth list elements

swap(terms, 8, 9)

#This prints the list elements

print(terms)

Read more about lists and list manipulations at:

https://brainly.com/question/24941798

A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1

Answers

Answer:.

Explanation:

What are the two negative impacts of computer technology to the society?​

Answers

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

Anyone know the logic notation of this following logic circuit?

Answers

Answer:

Concept: Logic Circuit

You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlist

Imagine you're in charge of managing an annual fest at your school. You have to select students and assign them different tasks. Write a short essay on the qualities and traits you would be looking for while selecting students. Explain why you think these qualities and traits are important. Also, describe how the lack of such qualities and traits would affect the work.

Answers

Answer:

Quality traits are important in many ways. A persons traits identifies them of how they treat you or how you might treat them. It is important to find good working people for the job. For example if one student is good at a specific task I might put them in that task or if another is good at stocking shelves or finding books I might put them in the library to help students find books. It is important as a supervisor to find people that listen and follow instructions not people that mess around and are unorganized. These qualities and traits are important to see the real potential of the employees. Finding the right people for the job will help the school and you as the supervisor to manage these employees. Making a application or employment sheet will help to find the right people making a sheet with some questions and have the potential employees fill it out to find their traits and skills.

Explanation:

Sorry I didn't have much background information on what you wanted me to write hope this works you can edit and change stuff though.

Also run this through Grammarly's plagiarism tester to see if it is plagiarism!

Question #5
Multiple Choice
Suppose this is your user-defined data type.
class player:
life = 3
magic = False
name = "
Which statement creates an instance of your data type?
O myPlayer = player()
O myPlayer.player()
O myPlayer = new player()
O myPlayer = player

Answers

Answer:  myPlayer = player()

Explanation: correct edge answer 2020

Answer: myPlayer = player()

Explanation: got it right on edgen

how to find radius of the base examples ​

Answers

Answer:radius is half the diameter

Explanation:

hey plz help, and thanks

Answers

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

D maybe??? Sorry if it’s wrong

objets will never appear to have more than one vamishing point
true or false

Answers

Answer: it’s True

Explanation:

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

PLS HELP BEING TIMED!!!!
Why do prospective lenders only accept FICO credit reports that are one or two days old, at most?
O Good credit scores can plummet quickly
O Credit scores change on a daily basis.
O Bad credit scores can improve quickly.
O Credit reports expire after two days and are no longer valid.

Answers

Answer:

O Credit scores change on a daily basis.

Explanation:

James wants to create a web page where he can write two paragraphs of text. The first paragraph of text should be colored red and the
second blue. Which snippet of code show the principle behind how James creates this page?

Answers

Answer:

The first code does it

Explanation:

Each of the attached code snippet is divide into two parts.

The CSS partThe html part

From the four code snippets, the first one answers it.

The syntax to format the paragraph of an html text using css is:

p#paragraph-id{

color:color-name

}

Analysing each element

p# -> This implies that a paragraph is to be formatted

paragraph-id -> This represents the id of the paragraph

{} -> The open and close curly braces house the properties to be formatted

color:color-name -> implies that the color of the element be changed to color-name (e.g. red or blue)

In the body tag of the html code, the first paragraph has an id of para1 and the second has para2 as its id.

i.e. <p id = "para1">......

So, the first paragraph will be formatted red while the second will be blue

Which best describes what databases do?

They guarantee users find needed data.
They create categories for data.
They identify important data.
They enable users to search for data.

Answers

Answer:

I think the first one

Explanation:

not sure you can also do some research bout it

Define watcher block

Answers

Answer:

Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.

Explanation:

The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.

If you had three extra siblings, what would be your birth order and what personalities would you like them to have?

Answers

Answer:

mixed personalities l

that will be cool

Answer:

I already have 4 step brothers, 2 real brothers, 1 step sister, and a half sister, so 3 more people would be a lot. If I got to pick their personalities and gender, I would want 1 more sister and 2 more brothers. I would watn a more alt brother, a more fem brother, and an indie sister. Kinda just an aesthetic type for them.

Which part of project management considers if employees will work at home or in the office?

Analysis
Resources
Scope
Time

Answers

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.

Explanation:

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

Which background-repeat value represents this div?
repeat

repeat-y

repeat-x

no-repeat

Answers

Answer:

repeat-y ................ ..

Major innovations made from the establishment of abucus to the 5th computer generation

Answers

Answer:

Cogs and Calculators

It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."

Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).

Explanation:

what class are you in?
can you help me in connection?

Answers

Answer:personal computer:)

Explanation:

What is Microsoft Windows?

Answers

Microsoft Windows is, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding

Answers

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

What is a resistor?
O A switch
O A light bulb
O A battery

Answers

Answer:

A Battery would be the correct awncer

Other Questions
1. A characteristic of the Renaissance Era is:A. Humanism, which stressed the worth and dignity of the individualB. an interest in the culture and heritage of ancient RomeC. the Fundamentalist Reformation, which splintered the Catholic Church and gave rise to other denominationsD. political music The area of a square shaped park measures 16900 square feet. How many feet of fencing would be needed to enclose that park? What is a stream created by? Slope and y intercept of y=2.7x+8 16. Rosa deposited $500 in a savings account with a SIMPLE interest rate of 3% per year. If she madeno other deposits or withdrawals, how much interest would she earn after 2 years? *(5 Points)$1.50$15.00$3.00$30.00 what is the slope, m, and the y-intercept of the line that is graphed below? What are variables? How can this expression be written another way?Apply the distributive property and the greatest common factor to write an equivalent expression.Enter your answer by filling in the boxes.105 + 35m = __ (__) Examine the accusations shaprio describes in paragraph 6 can you guys help me pls this is my final :( Plz help ASAP Plz and ty A school group is planning a trip to Jacksonville, Florida. There are 29 people going on the trip. They have agreed to share the total cost of the trip equally. Let s equal each persons share of the cost. What is each persons share of the cost? Solve this problem any way you choose. bus cost 7,830$ the hotel cost 10,034$ the meal cost 812$ the event ticket cost 435$ the cost of eveyting is 19,111$ If A = (2, 4, 6, 8, 10) and B = {4, 8, 10), then which of the following statements is false? Pls solve this...need help thanks :) After restocking the vending machines, Efrain determined that 2 out of every 5 packages of candy sold were M&M'S. The vending machine sold 160 packages of candy last week. How many packages of M&M'S were sold? brainliest question__ if you had to pick a lamborghini or a mansion what would it be?? We all have favourite activities we enjoy Writ easy "If a number divided by 4 leaves remainder 2 or 3", then which one is the correct statement 'n why?(a) The number is not a perfect square.(b) The number is a perfect square.(c) The number is a prime number.(d)None of these Find the missing quantity in the double number line. Simplify the expression 3t+5t-2t=6t