Which printing options are available in the Print menu? Check all that apply.portrait or landscape orientation
font size and color
printer selection
custom margin settings
Save As features
Print Preview

Answers

Answer 1
Answer:

1

3

4

6

mam nadzieje że pomogłem                                                  

Answer 2
Answer:

Answer:

1 potrait or landscape orientation

3 printer selection

4 custom margin settings

6 print preview


Related Questions

You just bought a new hard drive for your computer. You plan to use this as a secondary hard drive to store all your UMA files. Once installed, what needs to be done to the drive and what do these two tasks do?
Which of the following projections is typically used for navigation? A.MercatorB.Goode's Interrupted HomosolineC.RobinsonD.Orthographic
_____ installs itself on a computer without the user’s knowledge or permission for the purpose of tracking the user’s behavior. Answer Spyware Freeware Adware Cyberware
Alice talked to her school counselor about a career in the medical field. Her counselor told her about information the counselor found in a text book. Alice’s counselor is a _____.
You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values. What can you conclude?

I WILL MARK BRAINLIEST 1

Answers

Answer:

on or off

Explanation:

Answer:

on or off

Explanation:

A switch can only exist in one of two states: open or closed. In the off state, a switch looks like an open gap in the circuit. This, in effect, looks like an open circuit, preventing current from flowing. In the on the state, a switch acts just like a piece of perfectly-conducting wire.

4 Types of Switches

Basic types of switches are SPST, SPDT, DPST, and DPDT.

How many switches can you have on a circuit?

It may be as shown at the end of the run, but it may be between any pair of switch boxes (as shown in a later figure), or even between the panel and the first switch box. You can use as many 4-way switches as you like.

A company has three different PLANs for Sales, service, and accounting departments. Most network traffic is localized within the individual LAN. The company is concerned about the security of information within accounting department. Which segmentation device would be the best choice in this situation?

Answers

Answer:

The best choice in this situation is the Router.

Explanation:

A router is hardware networking device that receive, analyze and forwards data packets to another network or between computer networks. It assists to direct data on the internet and its connected to at least two networks. Router can also be a gate way that is an interface or connection between two or more networks.

What is an electronic path over which data can travel.

Answers

Im pretty sure its Bandwidth 

To move to the bottom of a document window, press the ____ key(s). ALT CTRL PAGE DOWN CTRL PAGE DOWN ALT PAGE DOWN PAGE DOWN

Answers

As for this problem, taking into consideration the options presented together with it, the most probable and the most likely correct one would be just PAGE DOWN.

having done the other sequence and combinations of keys in a document, they don't really do that much. That is why PAGE DOWN is there when scanning a document that is long or you just wanted to be at the bottom part of the document. It can also be used on other applications that can be scrolled to the bottom.

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

Answers

A computer virus is a program that is installed without the permission or knowledge of the computer user.

It is designed to alter the computer's normal operations and can replicate itself to infect other files, programs, or media it can access. Computer viruses are malicious and often spread through infected files, emails, or downloads.

Once inside a computer system, they can cause various damages, such as corrupting data, stealing personal information, or disrupting the computer's functionality.

As they replicate, they can rapidly spread to other devices and networks, making them a significant threat to the security and integrity of computer systems worldwide.

Protecting against viruses requires robust antivirus software and cautious online behavior.

Know more about computer viruses:

brainly.com/question/29446269

#SPJ5

That would be a virus.

Graphics you can select to reinforce the goal of your document include ____.a. pictures
c. shapes
b. logos
d. all of the above

Answers

The answer would be D all of the above.