Manipulating Text Sample Clauses

Manipulating Text. During the creation of your text, the Text Style menu will be opened on the right- hand side of your screen providing multiple adjustment options. Available Fonts The first section of this menu will display the current selected font with additional font options that are installed on your computer you may scroll through. The top of this section may be used to search for any specific font by typing in a font name if it is known. You may change fonts during the Text Editing Mode and use a new font within the same text box with other fonts. Different fonts may also be applied to existing text or letters during Text Editing Mode by highlighting the desired string and selecting the newly desired font. If you are not in Text Editing Mode, new fonts may still be applied to selected text, but such adjustments will change the font for the entire selected text box. Font Characteristics Some fonts are programmed to enable the use of certain style characteristics allowing you to bold, italicize, or underline text or letters. These characteristics will only be highlighted to be available for selecting if the font in question is programmed with that characteristic and such characteristics can be applied. To apply one of these characteristisc, you may highlight the intended letters or words and then click on the available characteristc. While Bold, Italic, and Underline options are displayed, if there are any additional available options programmed for the selected font, a scroll bar will appear on the right-hand side of this option box allowing you to scroll down and view whatever other options may be programmed.
AutoNDA by SimpleDocs
Manipulating Text. During the creation of your text, the Text Style menu will be opened on the right- hand side of your screen providing multiple adjustment options.

Related to Manipulating Text

  • Illicit Code Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.

  • Spam 3.1 Also known as junk mail or Unsolicited Commercial Email (UCE), the term "spam" refers to submitting a commercial email or SMS message to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.

  • Your Liability for Unauthorized Transactions You agree to exercise reasonable control over your PIN(s); user ID(s); and password(s) and any other access code related to your Debit Card (each, an “Access Code"). If you believe the Debit Card or Access Code has been lost, compromised or stolen, immediately contact us at 000-000-0000 or email us at xxxxxxxxxxx@xxxxx.xxx. Telephoning is the best way to minimize your possible losses. If you believe the Debit Card has been lost or stolen call 000-000-0000 or email at xxxxxxxxxxx@xxxxx.xxx. We may suspend or cancel your Debit Card in the event of excessive reports of Debit Card loss or theft. Under Mastercard Rules, particularly Zero Liability, you will not be held responsible for unauthorized transactions if you have used reasonable care in protecting your Debit Card from loss or theft and you have promptly reported to us when you knew that your Debit Card was lost or stolen. Zero Liability does not apply to Mastercard payment cards that are used for commercial purposes or anonymous prepaid cards. In the event that Mastercard Zero Liability does not apply, if you notify us within two (2) business days after you learn of any unauthorized transactions, you can lose no more than $50.00 if someone used your Debit Card without your permission. If you do not notify us within two (2) business days after you learn of the loss or theft of your Debit Card and we can prove that we could have stopped someone from using your Debit Card without your permission if you had promptly notified us, you could lose as much as $500.00. Also, if your statement shows transactions that you did not make, including those made by card, code or other means, tell us at once. If you do not tell us within 60 days after the statement was mailed to you, you may not get back any money you lost after the 60 days if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods. Also, if you become aware of and/or your statement shows transactions you did not make, notify us at once following the procedures stated in Section XVIII (Your Right to Dispute Errors). If you do not notify us within sixty (60) days after you become aware of the transaction and/or after the statement was made available to you, you may not get back any value you lost after the sixty (60) days if we can prove that we could have stopped someone from taking the value if you had notified us in time. You will not be liable for unauthorized use that occurs after you notify us of the loss, theft or unauthorized use of your Debit Card or Access Code(s). You also agree to cooperate completely with us and the Bank in attempts to recover funds from unauthorized users and to assist in their prosecution. The Bank may issue replacement Debit Card(s) or Access Code(s), but only after you have provided such proof and security or indemnification as the Bank may require. In addition, you acknowledge that the Bank may have to deactivate your Debit Card(s) to prevent future losses. If you share your Debit Card(s) or Access Code(s) with another person, use of your Debit Card by that person may be considered as authorized. If you authorize another person to use your Debit Card or Access Code(s), you agree that you will be liable for all transactions arising from use of the Debit Card or Access Code(s) by such person except as otherwise set forth in this Agreement. In all cases, our liability for an unauthorized transaction is limited to reimbursing you for the face amount of the unauthorized transaction and any corresponding fees, except as otherwise required by applicable law. A transaction is unauthorized if it is not initiated by you, you did not give permission to make the transaction or you do not benefit from the transaction in any way.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • Weapons (1) If the Contractor requests that its personnel performing in the USCENTCOM AOR be authorized to carry weapons for individual self-defense, the request shall be made through the Contracting Officer to the Combatant Commander, in accordance with DoD Instruction 3020.41. The Combatant Commander will determine whether to authorize in-theater contractor personnel to carry weapons and what weapons and ammunition will be allowed.

Time is Money Join Law Insider Premium to draft better contracts faster.