how do you know your print will come out looking the way you want it when you send it out to a printer

Answers

Answer 1

Through the print preview. Print preview is a feature that can be used before printing a document. When using this feature, we can see if the document we want to print is correct or not. and we can also arrange it before send it out to printer.

How to do print preview in Microsoft Word:

Click File on the left up cornerchoose printThen a document display will appear that looks like it has been printed

Apart from the method above, you can use a keyboard combination or shortcut to make it faster. How to use the combination CTRL + F2 for shortcut print preview.

Learn more about Print at: https://brainly.com/question/17441291

#SPJ4


Related Questions

alyssa wants to use her android phone to store and manage cryptographic certificates. what type of solution could she choose to do this using secure hardware?

Answers

She might use a safe hardware solution like a MicroSD HSM (hardware security module) to accomplish this.

Any physical part of an analog or digital computer is referred to as "computer hardware" collectively. The term "hardware" separates the physical components of a computing system from "software," which consists of written, machine-readable instructions or programs that instruct physical components on what to do and when to execute them.

Both hardware and software work well together. Only when hardware and software are properly integrated can a computing device operate effectively and generate valuable output.

Internal or external components make up different types of computer hardware. External hardware components are typically attached to a computer to add or enhance functionality, whilst internal hardware components are those required for the device to operate properly.

Learn more about hardware here:

https://brainly.com/question/5892106

#SPJ4

if stuff is a list of integers (with at least one element), what value is in the variable x after the code executes? x

Answers

If stuff is a list of integers (with at least one member), when the code is executed, the largest number in the list will be stored in the variable x.

A variable is a named container for a certain set of bits or types of data in computer programming. It is an abstract storage place with an associated symbolic name that holds some known or unknown quantity of information called a value (like integer, float, string, etc...). A memory address may eventually be used to link or identify a variable. The standard method of referencing a stored value, in addition to, or instead of, the variable itself, depends on the context. Due to the distinction between name and content, a name can be used regardless of the precise data it refers to. A value may be bound to an identifier in computer source code.

Learn more about variable here:

https://brainly.com/question/13375207

#SPJ4

data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify. true or false

Answers

Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify is false.

Why is data independence and what does it mean?

According to the definition of data independence, a DBMS's ability to alter the database schema at one level of a database system without also needing to update it at a higher level is a key feature. You can maintain data independence by keeping it separate from any programs that use it.

Therefore, For any form of a centralized DBMS, data independence is the kind of data openness that is important. It alludes to the user applications' resistance to modifications made to the definition and arrangement of data. Ideally, application programs shouldn't be made aware of the specifics of data storage and representation.

Learn more about Data independence from

https://brainly.com/question/14699179
#SPJ1

because small embedded systems typically run only one program, constants are always stored in ram so they can be easily changed. question 13 options: true false

Answers

True, constants are always saved in RAM so they can be altered easily because small embedded systems normally execute just one software. Computers make up embedded systems.

Is a grouping of a computer's CPU, memory, and input/output peripherals that performs a specific task as part of a larger mechanical or electronic system. It is integrated as a component of a finished product that frequently also includes mechanical and electrical components. The hardware and software that make up a computer system are used to carry out particular tasks. The term "system" refers to the coordination of separate elements that carry out a single activity or a group of related tasks are called as embedded systems.

Learn more about embedded systems here

https://brainly.com/question/9706390

#SPJ4

what is the maximum number of elements in a sorted array of 122 elements that will be examined using a binary search before it is discovered that the element is not in the array?

Answers

The above question is written in java programming.

int endOfArray = 122;

try {

  while (true) {

    int value = theArray[endOfArray*2];

    if (value > requestedValue)  // good enough

       return doBinarySearch(theArray, 0, endOfArray, requestedValue);

    else

      endOfArray*=2;

  }

}

catch (ArrayIndexOutOfBoundsException aioob) {

 // we know that the end of the array is less than endOfArray*2 but > endOfArray

 // do something clever here TBD.   :-)

}

The Java Programming Language is an object-oriented, concurrent, deeply typed, general-purpose language. The Java Virtual Machine Specification defines the bytecode instruction set and binary format to which it is typically compiled. Object-oriented programming (OOP) is a structure used in Java. A class-based programming language is Java.

The JVM performs the three basic primary tasks:

The class loader is responsible for loading code.

Byte code verification is used to validate the code.

runs code: carried out by the runtime interface

Learn more about  java programming here:

https://brainly.com/question/2266606

#SPJ4

which word can be used to identify the following words: double, float, else, string, void, true, false, public a. classes b. namespaces c. keywords d. methods

Answers

The dos and don'ts of writing C++ code are thoroughly explained in this article in order to manage this complexity.

One of the most popular development languages employed by numerous open-source projects is C++. Every C++ programmer is aware of the language's numerous powerful capabilities, but this power also adds complexity, which can make code more prone to bugs and more challenging to comprehend and maintain. These guidelines are in place to maintain code manageability while also enabling programmers to effectively use C++ language capabilities. The rules that guide our C++ code are referred to as style, sometimes known as readability. Since these conventions embrace much more than just source file layout, the name "Style" is somewhat misleading.

Learn more about code here-

https://brainly.com/question/17293834

#SPJ4

question 7 imagine a designer finishes a client project and wants to write a case study. they draft a case study that describes their role in the project, the goal of the project, and the target user. they also add sketches and wireframes, and their polished designs. what critical components are missing from the case study? select all that apply.

Answers

Instead of focusing solely on the appearance of the design project's final result, the case study aims to contextualize it and demonstrate how it functions in a real-world setting.

Should your design portfolio simply contain case studies from your professional UX design work?

Three to four pertinent UX case studies should be included in your UX design portfolio in order to fully showcase your skills. Recruiters may accept UX design portfolios that include 1-2 UX case studies if you are new to the field.

Which platform should you prioritize when creating a new product when building a cross-platform experience?

The platform you choose should satisfy the requirements of your end users. Having a distinct brand identity is crucial.

To know more about case study visit :-

https://brainly.com/question/24259426

#SPJ4

users at universal containers (uc) adhere to the following process for expense reports: create the expense report. attach receipts in an expenses app. send the report to the accountant to review and approve. an administrator needs to enable this app for salesforce mobile. what should the administrator consider from the user's perspective?

Answers

From the user's perspective, the administrator takes into account. User records can be created, submitted for approval, and receipts can be attached as images.

What in Salesforce is a universal container?

The rapidly expanding global producer of container solutions, Universal Containers, comes up with various scenarios by getting users to consider things from a business perspective and also by giving instructions on what sectors and scenarios we will encounter and how to deal with them.

Which MDM data piece is required for reporting between these systems?

US recently put into place a master data management (MDM) solution that will serve as the system of record for consumer information.

To know more about universal containers visit :-

https://brainly.com/question/15056535

#SPJ4

the operator could be used in place of minus if the dbms does not support it. a. in b. not in c. and d. union

Answers

If the dbms (SQL) does not allow minus, IN is the operator may be used in its substitute.

An operator is a reserved word or character that is often used in the WHERE clause of a SQL statement to carry out an operation, such as a comparison or an arithmetic calculation. These operators are used as conjunctions for many conditions in a statement as well as to specify conditions in a SQL statement.

Operators in mathematics

operators for comparison

Reasoning operators

operators for denying conditions

A value is compared to a list of literal values that have been supplied using the IN operator.

To compare a value to every value in another value set, use the ALL operator.

Multiple criteria may occur in the WHERE clause of a SQL query thanks to the AND operator.

Learn more about Yield here:

https://brainly.com/question/13068613

#SPJ4

which protocol can send cryptographic confirmation that an endpoint is who it claims to be so that arp poisoning is hindered?

Answers

The Secure Neighbor Discovery (SEND)  protocol can send cryptographic confirmation that an endpoint is who it claims to be so that ARP poisoning is hindered.

ARP poisoning is the practice of tricking hosts into delivering the attacker's traffic to someone else in order to gain access to the broadcast section. This is prevented by the SEND Protocol.

Any neighbor, presumably even in the presence of authentication, is able to send Router Advertisement messages and thereby able to cause a denial of service.

The protocol contains no mechanism to determine which neighbors are authorized to send a particular type of message (for example, Router Advertisements). Additionally, any neighbor has the ability to launch a potential denial-of-service assault by sending proxy Neighbor Advertisements and unsolicited Neighbor Advertisements.

Support for SEND is currently regarded as optional. SEND deployment is probably only going to be taken under consideration in situations where nodes are operating in exceptionally rigorous security environments because of how difficult it is to deploy it and how heavyweight its provisioning is.

To learn more about ARP poisoning click here:

brainly.com/question/28381584

#SPJ4

write the turtle graphics statements to draw a square that is 100 pixels wide on each side and filled with the color blue.

Answers

It draws the blue square at coordinated(100,0) 50 pixel wide, and in the lower-left corner. You should know that the lower-left corner of the square should be at position x, y. Hence, The answer.

And this is true for any shape that you draw using turtle graphics in Python.

You should also know the function format of Python, and how it is defined, declared  and called. The penup command tells the turtle to not show what is drawn, or hide the link. The pen down is just opposite to this.

The count is an above with range to create a for the look .Forward moves the cursor according to width mentioned.

See how to pen down is called before beginning fill. And how we move to x, y using go to, and how the penup is used to hide ink while  fill color is in effect, and we move to x, y.

To learn more about Turtle Graphics, Click here

brainly.com/question/20718793

#SPJ4

a laptop has 1gb of installed memory and uses shared video memory. if the video card is using 256mb, how much is left for the rest of the system?

Answers

Using shared video memory, a laptop has 1 GB of installed memory. If the video card is only consuming 256MB, the remaining 768MB can be used by the system.

The ability of the mind to encode, store, and retrieve information when required is known as memory. It is the process of holding onto knowledge over time in order to influence behavior in the future. Language, relationships, and the development of personal identity would all be impossible if the past was not remembered. Forgetfulness or amnesia are common terms used to describe memory loss.

A sensory processor, short-term (or working) memory and long-term memory make up the information processing system that is commonly referred to as memory. The neuron may be relevant in this. The sensory processor enables external information to be sensed as chemical and physical stimuli and attended to at different levels of focus.

Learn more about memory here:

https://brainly.com/question/28698996

#SPJ4

how to create two indepedent sheets in sheets so that when you create a new row it doesn't emss up

Answers

Press Shift + Space while selecting the cells where the empty rows should appear.then right-click anywhere inside the selection and select Insert from the menu list.

To learn more about Insert click the link below:

brainly.com/question/8119813

#SPJ4

the standards for sql has been maintained by the american national standards institute (ansi). select one: true false

Answers

The correct answer is True the standards for sql has been maintained by the american national standards institute (ansi).

The existing records in a table can be deleted using the SQL DELETE Query. All of a table's rows are removed using the truncate command. A where clause cannot be used in this. A DDL command, that is. Each record that has to be deleted from a table is locked using the SQL Delete statement. Data kind. Fixed-length character data types are the second best option for a primary key after integer (number) data types. Because character data type values must first be converted to ASCII values before processing, SQL Server processes number data type values more quickly than character data type values. String(n) is not supported by the SQL standard, although char, varchar, and float are.

To learn more about sql click the link below:

brainly.com/question/13068613

#SPJ4

while developing a program, you find a similar project that someone has created and posted online. it contains a number of elements (e.g., images, music, code segments, etc.) that you would like to integrate into your own project. under what conditions may you reuse these elements in your work?

Answers

Only elements for which the original owner has granted a license to reuse may be used again.

Which of the following phrases especially alludes to pictures that are saved as a collection of digital values known as pixels?

This is true. An image that is stored using pixels is properly referred to as a raster image. Raster image formats include the file types PNG, JPG, and PNG.

Which of the following protocols is most frequently used for connecting to the Internet?

Hyper Text Transfer Protocol - One of the most well-known protocols, hyper text transfer protocol (HTTP), is frequently referred to as the internet's protocol. The communication between the browser and server is made possible using HTTP, an application layer protocol.

To know more about code segments visit :-

https://brainly.com/question/26683418

#SPJ4

if the sdn controller wants to split the ttraffc from a switch/router evenly into multiple outgoing links.what information will be for the controller determine the rules

Answers

SDN controller manages flow control to the switches/routers “below” (via southbound APIs) and applications and business logic “above” (via northbound APIs) to provide an intelligent network.

What protocol does the SDN controller use to control the SDN controlled switch?

Open Flow is the default southbound protocol used between SDN controllers and switches. The SDN controller takes information from the application and converts it into flow entries that are fed to the switch via the OF. It can also be used in network management to monitor switch and port statistics.

What interface is used for communication between SDN controllers?

It is an open interface that configures the forwarding tables of network switches and routers according to the desired route of network packets derived and determined by the SDN controller.

How do SDN controllers communicate with each other?

These use announcement and messaging systems or distributed routing protocols such as BGP or OSPF. Sixth, the southbound interface allows interaction between the control plane and the data plane. Collectively, this can be defined as a protocol that allows controllers to push policies to the forwarding plane.

To learn more about SDN controller visit:

https://brainly.com/question/11058708

#SPJ4

Other Questions
given his theory of personal identity across time, how would thomas reid respond to the following question: is the person described in the thought experiment the same person as you, or not? Problems 2-3 refer to the following situation. A lake has a depth of27.5 m. The lake is filled with water, with has a density of1000 kg/m^3. Since the top of the lake is open to the air, the pressure at the top of the lake is the atmospheric pressure,P 0 =1.010^5. Problem 2: What is the pressure at the bottom of the lake? a.1.710^5 Pab.3.710^5 Pac.5.710^5 Pad.7.710^5 PaProblem 3: An underwater vehicle is at the bottom of the lake. The vehicle has a circular window of radius0.175 m. What is the force on this window, due to the water? a.1.610^4 Nb.3.610^4 Nc.5.610^4 Nd.7.610^4 N 3. A ballon of weight 300 N is moving upward. Volume ofballon is 30m and displacing air of density 1.2kg/m 11.Athen the upward force acting in the ballon is? credit cards are part of select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a m1 and m2 b m1 but not m2 c m2 but not m1 d neither m1 nor m2 a 2000 hz sound wave passes through a wall with two narrow openings 30 cm apart. if sound travels on average 352 m/s, find the following. (a) what is the angle of the first order maximum? Consider continuous functions f and g. then complete the statement. function g is the sum of 2 and the cube root of the sum of three times x and 1. select the correct answer from each drop-down. the x-intercept of function f is the x-intercept of function g. a___is a syndrome marked by a clinically significant disturbance in an individual's cognition, emotion regulation, or behavior. adam has collected the birth rates, gender, age, and total population numbers for akron, ohio. what population statistic could adam calculate with this information? The polygons in each pair are similar. Find themissing side length.40Type your answer...20?4 A football match consists of two 45 minute halves and a 30 minute break in between. How many minutes does the whole match last for? What is the best way of celebrating Christmas? an entity engaged an accountant to review its fs in accordance with statements on standards for accounting and review services. The accountant determined that the entity maintained its accounts on a comprehensive basis of accounting other than generally accepted accounting principles. In this situation, the accountant most likely would taken which of the following actions?Modified the review report to reflect the fact that the fs were presented on another comprehensive basis of accounting For financial reporting, Clinton Poultry Farms has used the declining-balance method of depreciation for conveyor equipment acquired at the beginning of 2018 for $3,000,000. Its useful life was estimated to be five years, with a $215,000 residual value. At the beginning of 2021, Clinton decides to change to the straight-line method. The effect of this change on depreciation for each year is as follows:($ in thousands)YearStraight LineDeclining BalanceDifference2018$557$1,200$64320195577201632020557432(125)$1,671$2,352$681Required:2. Prepare any 2021 journal entry related to the change. (If no entry is required for a transaction/event, select "No journal entry required" in the first account field. Enter your answers in whole dollars.) which client characteristics are assessed to determine the effectiveness of brimonidine ophthalmic solution? select all that apply. the nurse is preparing to give prescribed haloperidol to an acutely dehydrated client. after administration, the nurse should prioritize what nursing assessment? the most common type of regenerated fiber, which is derived from cellulose and is mostly plant in origin, is rayon. t or f the social relations through which human labor is used to transform energy from nature using tools, skills, organization, and knowledge, is called Which species in the reaction below is being reduced?H2O(g) + CO(g) H2(g) + CO2(g) What is the Giver's role in the community and what does he transmit to Jonas? Monks devoted their lives to spiritual goals in the Middle Ages. Lookon the Internet or at the library to find out three facts about monasteriesin the Middle Ages.