Which of the following are the rows or columns of white space created between grids?
alleys
gutters
margins
thirds

Answers

Answer 1

The white space between the columns or rows in a grid are called gutters. Gutters provide separation for readability and aesthetics, while margins are the surround space around the entire document's content.

The rows or columns of white space created between grids are known as gutters. Gutters are the empty spaces that serve to separate columns, rows, or blocks of content. In contrast, margins refer to the white space surrounding the text on a page or the edges of a document, and they can be set to various sizes to affect the document's layout and readability.

While the term 'alley' is less common in design, it sometimes is used interchangeably with gutter, especially in newspaper layout. However, for standardized terminology, 'gutter' is the most widely accepted term for these white spaces between columns on grids.

Margins are important for the overall appearance of a page, as they define the printable area. Margins that are too narrow can make a page look crowded. Conversely, wider margins reduce the print area but can make a document look more open and easier to read.


Related Questions

Flinstonia has a real GDP of $100,000, and Bedrockton has a real GDP of $100,000,000. Which country has the higher standard of living?

Answers

Bedrockton because the higher the GDP the higher the living standard.

Match each malware type to its description

Answers

1. Trojan Horse

2. Worm

3. Virus

The infection of files by malicious programs, software and files could take different forms. The expressions given represents programs capable of damaging computer files.

Trojan horse WormVirus

Trojan horse are described as programs which are appears to be innocuous or harmless. Hence, using these medium to penetrate into our computer files.

Worms describes malwares which are capable of splitting from one single or independent malware so theu could spread through a network of computers.

Viruses creeps into a computer when they become attached to a file or program. This infecting computers upon the installation or download of such file.

Therefore, all stated programs causes damage to computer and file system.

Learn more :https://brainly.com/question/2203272

What of the following can a cell contain? A number a word a function of these

Answers

A function of these

Items that represent features of smartphones apps

Answers

Smartphone apps, available on devices such as iPhones and tablets, offer a multitude of capabilities through their applications, from location-sharing with GPS to cross-media integration. The App Store's growth illustrates the wide range of assistive functions apps can provide. Yet, there may still be functions requiring other devices, showing technology's evolving role.

The discussion is centered around items that represent features of smartphone apps. Smartphones and tablets have become integral parts of our daily lives, serving various functions through applications, commonly known as apps. These mobile devices are equipped with a range of capabilities, thanks to technological advancement.

Applications such as those for location-sharing utilize GPS functionality to help users find and check-in at venues, while cross-media apps tie in with TV shows or music stations for an integrated entertainment experience. The iPhone's App Store, a pioneer in the industry, has seen exponential growth in the number of downloadable applications available to users, thereby assisting in numerous daily activities and creating a new cultural language encapsulating these functions.

For instance, apps have been designed to help with navigation, identify stars in the night sky, manage social media, or even learn new things. However, despite a phone's vast functionalities, there might still be some functions for which we need other devices. This speaks to the evolution and diversification of app functions, which continue to reshape our interaction with technology and each other.

Can someone please check if I’m correct? Code is in Java

Answers

You are right. Option 1 would give 11 iterations.

In what two ways can you measure hard drive speed? Explain each of these measurements.

Answers

u can measure it in GB, MB, and TB. which is mainly in measuring it by storage

Scenario 1:

Aiden comes in from work. Jane had cooked dinner and is waiting for him so they could eat. However, Aiden is tired and just wants to go to bed. Jane is furious and refuses to speak to him. In response, he merely goes to their room and sleeps.

Scenario 2:

Aiden comes in from work. Jane cooked dinner and is waiting for him so they could eat. However, Aiden is tired and just wants to go to bed. Jane is furious and tells him how she feels whenever he does this to her. Aiden empathizes with Jane’s feelings and offers a compromise; the next time he would be in late for dinner, he promises to call ahead of time.

In the supportive scenario, what do Aiden and Jane do in order to alleviate the conflict?
a.
They asked open ended questions.
b.
They strove to promote equality.
c.
List all problems and annoyances.
d.
They empathized with each other.

Answers

d.
They empathized with each other

Answer:

1. c. List all problems and annoyances.

2. Option d.  They empathized with each other.

Explanation:

In the first scenario, the two characters are frustrated at each other as they misunderstand each other. Jane does not understand why Aiden is late. On the same note Aiden expects Jane to understand why he is late. This creates a scene of the problems and annoyances in the house.

In the second scenario, we see a different picture. There is clear communication. Aiden gives his side of the story and Jane gives her side too. They both understand why they were frustrated with each other. They then make a resolution to solve the conflict. In other words, they empathize with each other.

Which statements are true about satellite internet access

Answers

Answer:

it is cheap it is the slowest internet access technology it can be used in rural and remote areas. it requires direct line-of-sight to work it requires major installation of new infrastructure. it covers a large geographical area. reset next - Soetrust

Students can use eNotes to type notes directly on screen and
A. review or print them later.
B. post visual cues on their desktop.
C. clip text and images from websites.
D. store information to a back-up system.

Answers

Answer:

a i think sorry if im wrong

Explanation:

Students can use eNotes to type notes directly on screen and store information to a back-up system.

What is Enotes?

Brad Satoris and Alexander Bloomingdale created the free educational website eNotes in 1998. It offers resources to aid students in completing their homework assignments and preparing for tests. eNotes is a Seattle, Washington-based company that focuses on providing lesson plans, study materials, and literary analyses.

Although the business offers a wide range of topics in the humanities, the website's content primarily focuses on literature and history. The majority of the content is contributed by a network of more than 1,000 professors and teachers.

It differs from other paid online education providers in that uploaded works are primarily edited by an internal publishing team.

Therefore, Students can use eNotes to type notes directly on screen and store information to a back-up system.

To learn more about Enotes, refer to the link:

https://brainly.com/question/2114707

#SPJ3

How do they make the "chips" in computers?

Answers

This is done using an optical process, not unlike how old photos were printed. A silicon wafer is covered with some etching resisting material, and then exposed to UV light through a mask. The mask is a drawing of the chip schematic.

The etching resisting material is removed where the light hits (or vice versa), and parts of the silicon wafer is etched away with a chemical. Different layers can be deposited by repeating this process.

Finally the wafer is cut into little rectangles and placed inside a housing.

What happens if too many elements within the photograph demand equal attention

Answers

The hierarchical development consists of a dominant and subordinate visual elements and no visual element is insignificant; each and every one contributes to communication of the message and it depends on complementing and contrasting of visual elements. If the design has a clear focal point which initiates viewers interaction with the design and then clear subordinate elements to support the focal point–the design maintains fixed attention of the eye. But if all visual elements demand equal attention, the eye is destructed and wonders around the page without any direction.
Hierarchy begins by rating visual elements by importance: what needs to be seen first, second, third, etc. Dominant elements will reside in a foreground while subordinate elements will activate the background in support of dominant elements.
Examples:

What is the outcome when you select a section of unformatted text and click the Bold option, then the Italic option, then the Underline option? A. The resulting section of text will remain unchanged because this works only for individual words. B. The resulting section of text will only have the last formatting (underline). C. The resulting section of text will be bold, italic, and underlined. D. The resulting section of text will remain unformatted because you cannot use more than one formatting style. E. The resulting section of text will be bold and the program will ignore all other styling after that. Reset Next

Answers

I believe the answer is C

Answer:

c

Explanation:

How many 4 GB movies could you store on a 500 GB hard drive?

Answers

125 movies and maybe some kb sized movies (depends on the amount of kb)

in order to figure this out you must divide the amount of space by the space a single movie take. This will give you the amount of movies you could have. 500/4=125. therefore you could have 125 movies

You have just finished entering field names for your database . You need to choose the primary key or key field but none of your fields are unique. What should you do ?
A. Save the database without a key field
B. Use one of the existing fields even if it is not unique
C. Let the database assign a unique number in a new field
D. Use a spreadsheet instead

Answers

C. Let the database assign a unique number in a new field

Answer:

Option C is the correct answer to the following question.

Explanation:

In the following option is true because when once the entering of the fields name is done and you didn't choose any of the fields as primary but you want to choose field as primary and you also not choose any field as unique then, you should do one thing, you have to assign a unique number in your database in a new field.

What Word feature is seen below?

a.
a ScreenTip
b.
the QAT
c.
the Ribbon
d.
submenu

Answers

hi there


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!





it c the ribbon tab. just want  to help .





!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


hope this helps. if you want please mark brainlyist. enjoy





You can remove selected text from a slide by pressing the CTRL+X keyboard shortcut keys.

Answers

Okayyyyyyyyyyyyyyyyyyyyy

Technicans A says the engine camshaft converts reciprocating motion of the piston into rotary montion for power output. Technician B disagrees and says the crankshaft performs this function who is right?

Answers

It doesn't say what Technician B thinks, but I can tell you what the camshaft does and then you can decide who is right on your own. The camshaft is little metal rounded triangles above the piston that times when the intake and exhaust valve open and close.

Technician A is very wrong, the camshaft doesn't do that.

Final answer:

In a four-stroke internal combustion gasoline engine, both the crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

Explanation:

In a four-stroke internal combustion gasoline engine, both the engine's crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

The crankshaft converts the up-and-down motion of the piston into a rotating motion, which is then used to transfer power to the wheels of a vehicle or other devices.

The camshaft is responsible for opening and closing the engine's valves at the correct times, allowing for the intake of fuel-air mixture and the exhaust of combustion byproducts.

which protocol sends a request to view or download a website or file

Answers

i this it is HTTP protocol. It is also assumed that you have some basic knowledge of URLs. (A URL is the address of a document, what you need to be able to get hold of the document.)

Answer:

HTTP protocol

Explanation:

The HTTP protocol is the base for the communication in the World Wide Web and it is used to transfer hypermedia documents which helps computers to communicate with customers requesting data and servers answering to these requests which allows to have access to a website. According to this, the protocol that sends a request to view or download a website or file is the HTTP protocol.

Give three reasons why Black hats hack?

Answers

this one makes no since to me sorry.

Answer:

Explanation:

In bo2 they can hack scorestreaks!

Enter a formula or in sales G5 the calculate the difference between the attendance totals for 2018 and 2017

Answers

we will write year in column B and column c respectively

2017 and 2018

then we will add months of year from January to December in the cells range from A2 to A13

then we will choose cell g5 and will write the diffrence formula

g5=attendance of 2018 - attendance of 2017"

we put "=" sign to put an formula in excel

then finally we will use fill handle and drag it from g6 to g12

to copy the difference  formula

look at attached file

Which law requires employers to provide safe working environments for their employees? A. Civil Rights Act B. Fair Labor Standards Act C. Occupational Safety and Health Act D. Wagner Act

Answers

Answer:

C. Occupational Safety and Health Act (OSHA).

Explanation:

This law requires employers to provide safe and healthy working conditions for their employees.

By what year had improvements in technology vastly improved the ability to stream videos online ? 1996 2006 2000 2012

Answers

2006

the year 2006 had the ability to lower costs and improve efficiency,


Final answer:

Improvements in technology drastically improved the ability to stream videos online in 2006.

Explanation:

The year that improvements in technology vastly improved the ability to stream videos online was 2006. Prior to this year, there were limitations in bandwidth and internet connections, making it difficult to stream videos smoothly. However, with advancements in broadband internet and video compression techniques, streaming video became more accessible and widespread.

Learn more about Improvement in technology for video streaming here:

https://brainly.com/question/34531430

#SPJ2

Tina is making a resume for the first time. What should her heading section include?
A. Her skill set B. Her name and contact information C. Her career objectives D. The word “Résumé”

Answers

Name and contact information

What are the most important advantages of using the insert chart tool in word and importing data from Microsoft excel

Answers

I am not sure but I think that it is the third answer

what is scratch in information system .

Answers

Scratch is a visual programming dialect and online network focused on essentially at youngsters, by coding with squares in the manager. Clients of the webpage can make online undertakings utilizing a square like interface. Scratch is a genuine programming  language in its own right. Scratch is written in squeak, an open source execution of smalltalk-80 dialect.

How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple___ engineering.

Answers

The answer might be social

Answer:

simple social engineering

Explanation:

social engineering as regards to information security and not social science. is the act of deceiving people into performing/practicing unconventional activities on the information network that will get their personal data exposed.

This psychological manipulation of people on the network into performing unconventional activities that will get their personal data exposed is mostly performed by hackers. the aim of this is to perform fraudulent or malicious activities using their personal data either on them or on unsuspecting individuals.

A hacker is someone who tries to break in a computers defense system by exploring ways around it instead of seeking permission to have access into the system.

The _____ can be used to paste text in any order.

Answers

The answer is Clipboard

The Clipboard in Microsoft Office products stores text copied or cut from anywhere and allows you to paste the stored items into the current or another Office document. This tool can allow you to copy items and paste them the way you want in the document.

Answer:

clipboard

Explanation:

the clipboard can be used to paste text ion any order either by copying it or cutting it (not 100% the answer but still acurrate)

Kayla is working on a document for her school project. She wants to save this document with another name. Which option should she use? Kayla should use the
________ command to save her document with another name.

Answers

Save As Command in MS Word

Answer:

Kayla should use the “save as” command in other to save the file with another name.

Explanation:

Kayla should use the “save as” command in other to save the file with another name. When you’re working on a file and press the “save” command, all the changes made are going to be saved in the current file. However, you may need to make some changes preserving the original file. Or you may need to save the file with another name for some reason. In those cases, the “save as” command  duplicates de file as it lets you save it with another name while keeping the previous file.

__________ has the highest conviction rate of any vehicle-related offense.

A. Changing lanes without signaling

B. Failure to stop at a red light

C. Speeding

D. Parking at a red curb

Answers

Answer:

Speeding

Explanation:

Excessive speeding has the highest conviction rate of any vehicle-related offense. It is often said that "speed thrills but kills." This statement is true. A cautious driver should always check for speed signs and always play by the rules. Speeding will not only get you a ticket but also will cause fatal accidents or collisions that might lead to injury or death. Speeding offenses include fines, points reduction, or court hearing.

Shelby is the operations manager for a public-works project. She is revising several of the procedures used. A number of people must review the procedures and add revisions. The best telecommunications tool for Shelby to use to manage this project is a(n) _____. blog
e-mail
fax machine
wiki

Answers

Answer:

Email

Explanation:

Bc it's telecommuting to multiple people

Other Questions
what is the estimate of 8.36 Why did it take the states so long to ratify the Articles of Confederation?What was the Stamp Act of 1765?The First Continental Congress sent a petition to King George. What did it proclaim Marjorie baked 100 cupcakes for a bake sale. She sold each cupcake for $0.50. The function P(c) = 0.50c represents the amount, in dollars, that she earned from the bake sale by selling c cupcakes. What domain and range are reasonable for the function? A contaminant is found in a solution at a level of 3/500%. What fraction of the solution is this True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards A compound has a molar mass of 92.02 grams/mole, and its percent composition is 30.4% nitrogen (N) and 69.6% oxygen (O). What is its molecular formula? A. N2O4 B. NO2 C. N2O D. N4O2 Write a polynomial function with zeros -7, -1, 4 7.3 back side help me 6. The average copper ore mined in 1900 was five percent copper by weight. Copper ore mined in 1990 was approximately 0.5 percent copper by weight. What factors could account for this difference?" What is the length of the midsegment of the trapezoid made by the vertices A(0, 5), B(3, 3), C(5, -2) and D(-1, 2). Show equations and all work that leads to your answer. The stem and leaf plot below displays a set of data recorded in the North Pole.Stem:-3, -2, -1, 0, 1, 2, 3Leaf:5,2,2,1,0,7,7,7,5,3,2,0,-9,-6,-4,-1,-1,0,3,6,1,2,5Which box plot closely resembling the data set within the stem and leaf plot, represents a data set with outliers? The coldest surface temperature on the moon is 57 degrees colder than twice the coldest surface on Earth. What is the coldest surface temperature on Earth if the coldest temperature on the moon is -116 degrees? Which of this fraction are greater then1/2 but less then 3/4 .7/8 .2/5 .1/3 .5/8 .3/6 Which lines contain diction that creates the overall tone? Check all that apply. It was a lovely sight to see Amid the jaggd shadows To make her gentle vows Her face, oh call it fair not pale Each about to have a tear You work at a fruit market. Bananas cost 50 a pound. A customer hands you a bunch of bananas that weighs 3 pounds. How much should you charge for the bunch of bananas? What does neurons do? Which factors were affected by the breakup of the supercontinent Pangaea? Check all that apply.the shape of Earths orbitglobal wind patternsocean currentsthe tilt of Earths axisglobal climates the ratio for the number of people that use an android phone to the number of people that use an iphone is 4:5 if 56 people in the movie theater use and android phone, how many people would you expect to use an iphone show all work including labels and write a therefore statement Ryan has 4 cups of grape juice and Kelsey has 7 cups of lemonade they want to combine what they have to make punch how many 1/2 cup servings of punch can they make when f(x) = x-7/2 , what is the value of (f^0 f^-1) (3) Steam Workshop Downloader