________ is the process of modifying the text in a document by changing fonts and paragraph characteristics

A) Arranging
B) Designing
C) Laying out
D) Formatting


D

Computer Science & Information Technology

You might also like to view...

The __________ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.

A. cipher block chaining B. meet-in-the-middle attack C. counter mode attack D. ciphertext stealing

Computer Science & Information Technology

To have a designer-quality look to your presentation that includes coordinating colors, matching fonts, and effects, you would apply a(n) ________ to the presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology

COGNITIVE ASSESSMENT After a power failure, you instruct the DBMS to use the log to reenter any changes made to the database since the last save or backup. What term is used to describe this backup technique?

A. restoration principle B. forward recovery C. continuous backup D. rollback

Computer Science & Information Technology

The ____ command causes the movie to begin playing frame by frame, from the location of the playhead and continuing until the end of the movie.

A. Rewind B. Play C. Step Forward D. Step Backward

Computer Science & Information Technology