Answer:
I think VPN firewall devices can do that.
list any four e-commerce website
Answer:
Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.
eBay. ...
Walmart. ...
Etsy. ...
Home Depot. ...
Target. ...
Best Buy. ...
Wayfair.
Answer:
I'm sorry is this a question?
how can i help?
Explanation:
Question 1 of 10
When you edit your slide by making sure that that first paragraph is right
justified, what are you correcting?
A. Hyperlinks that no longer work
B.Inappropriate content
C.Grammatical mistakes
D.Text alignment
B. Inappropriate content
C. Grammatical mistakes
D. Text alignment
SUBMIT
When you edit your slide by making sure that that first paragraph is right justified, here, one is correcting Text alignment. The correct option is D.
What is Text alignment?Text alignment is a paragraph formatting attribute that determines how text appears throughout a paragraph.
For example, in a left-aligned paragraph (the most common alignment), text is aligned with the left margin. Text in a justified paragraph is aligned with both margins.
Alignment or range is the setting of text flow or image placement relative to a page, column, table cell, or tab in typesetting and page layout.
The type alignment option is also known as text alignment, text justification, or type justification.
Text alignment is corrected when you edit your slide by ensuring that the first paragraph is right justified.
Thus, the correct option is D.
For more details regarding text alignment, visit:
https://brainly.com/question/13423071
#SPJ7
what if the result of conectivity testing is 100%Loss?Explain.
Answer:
If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server
What’s an input Device
Answer:
._. a computer is a input why because you can tell
Explanation:
Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray
Answer: It is raid
Explanation:
Took the test for edge
Write a program using for loop to find the cube of numbers from 50-100
Answer and Explanation:
JAVA
for(int i = 50; i <= 100 i++;)
{
int cubedNum = Math.pow(i, 4);
System.out.println(cubedNum);
}
There is one clear definition of IT. True False
Answer:
That is False. it has more definitions not only one.
how will you create new style in a spreadsheet? explain
After inserting a video into your slide how can you test it
Explanation:
How to insert video into PowerPoint
Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.The average lease payment for a new vehicle is just over $450 per month for a three-year...
Answer:
it depends on your insurance company
Explanation:
PLS REPLY ASAP WILL MARK BRAINLIEST
Answer:
I replied ...?
Explanation:
What are practical things people can do to protect their privacy and security online? What can we do, and what can we avoid doing?
Please help this is due today and I really need help.
When using e-mail for business purposes, employees should _____.
be brief
use spell check
use appropriate punctuation
write in all capital letters when the message is important
use correct grammar
send out jokes to increase employee morale
proofread messages
use extra exclamation marks to indicate urgency
Answer:use spell check
proofread messages
use appropriate punctuation
be brief
use correct grammar
Explanation:
libre office is what program
Examples and meaning of external hardware.
Answer:
External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.
5 examples of hardware?
Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.
Explanation:
Hope this help have a good rest of your day
Mention the usage of crop concept in ms-word
Answer:
Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.
[tex]\huge\underline\mathbb\pink{ANSWER:}\\\\[/tex]
Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Word allow you to hide portions of pictures that you do not want to be displayed in the final result.
[tex]\\\\\\\\[/tex]
HOPE IT HELPS
PLEASE MARK ME BRAINLIEST ☺️
Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest
ANSWER ASAP!!!!!!!
Which variable captures the fact that a person is spontaneous or flexible?
A.
senses
B.
judgment
C.
perceptiveness
D.
feeling
E.
intuition
Answer:
C - perceptiveness
Explanation:
PLATO
Successful businesses must have managers who are able to complete each of the management functions well. True False
Answer:
I think that is true.
Q6.
A doctor's surgery provides medical care for people in the local area. The surgery uses Information
Technology to collect, store and process patient data.
Usernames and passwords are used to restrict user access to patient data.
Explain two other ways the surgery can restrict user access.
ANSWER ASAP!!!!!!!
Which statement best describes licensed characters?
A.
They are based on real-life characters from past periods in history.
B.
They are given human qualities, and star in games for young children.
C.
They are based on preexisting media.
D.
They are based on legend and folklore.
E.
They are characters specifically created for a game.
They are given human qualities, and star in games for young children.
What are Human qualities?Telling the truth, being direct with others, and being open-minded are all examples of being honest. Tell the truth, but never the unpleasant truth, as a very wise man once advised.
If someone has personal integrity, they will always endeavor to act morally even if no one will ever know what they did. They possess a strong sense of morality. Doing the right thing despite the repercussions requires courage.
Everyone can benefit from having integrity, but leaders especially need it.
Therefore, They are given human qualities, and star in games for young children.
To learn more about Human qualities, refer to the link:
https://brainly.com/question/983958
#SPJ2
Which statement best describes fonts from a serif font family?
A.
These fonts have tapered corners and edges at the end of their strokes.
B.
These fonts have straight lines and uniform stroke widths.
C.
These fonts are cursive and italicized.
D.
These fonts have fixed widths.
Answer:
A
Explanation:
The main characteristic of a serif font is the tapered corners, so the answer would be A.
Answer:
A. These fonts have tapered corners and edges at the end of their strokes.
Explanation:
just did the test this is the answer, hope I helped :)
where can i make an animation for free?
Answer:
I've heard of flipabook and apparently that's good for simple animations
Explanation:
Hope that helped! Have a nice day!
I need somebody to help me with this question I’ll give points!
Please help no funny business
Answer:
create a new folder (you need that in order to choose it as a destination)
click the rules button
new rule; blank rule
select forms and conditions
apply the rule to messages received
ANSWER ASAP!!!!!
Which statement is true regarding achievers?
A.
Achievers bring about a reduction in socializers.
B.
Achievers interact with the environment.
C.
Achievers cause grief to other players.
D.
Achievers like to interact with other players.
E.
Achievers like to collect points and earn rewards.
Answer:
The correct answer will be:
E. Achievers like to collect points and earn rewards.
Explanation:
Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:
Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.
The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.
What do you mean by term E-mail?
An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..
E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.
Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.
In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.
Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.
Therefore, correct options are A and C.
Learn more about E-mail, refer to the link:
https://brainly.com/question/13313275
#SPJ2
Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False
Answer:
true
Explanation:
mark brainliest ☺☺☺☺☺☺
Complete the sentence.
involves placing a device on the network that captures all the raw data in the network traffic to try to find something valuable
A. Dumpster diving
B. Packet sniffing
C. Social engineering
D. Phishing
Answer:
D. Phishing
Explanation:
Answer: B. Packet sniffing
Explanation:
right on edge
The most effective leaders treat everyone alike. True True False
Answer:
you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)
Explanation:
Answer:
True
Explanation:
What is the most important function of a network operating system (NOS)?
Answer:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
Explanation:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
What is network operating system?An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).
A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.
Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems
Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
To learn more about network operating system, refer to the link:
https://brainly.com/question/28356173
#SPJ2