Answer:
The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection
The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.
Answer:
(a): Replace
(b): Hyperlinks
(c): Document Inspector
(d): Compatibility checker
(e): Accessibility checker
Explanation:
You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.
However, further explanation is as follows;
(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.
(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.
(c): Document inspector checks hidden data such as personal information.
(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.
(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.
The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;
REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKERA) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.
B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.
C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.
D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.
E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.
Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179
Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used for a variable number of iterations. C. It uses an integer counter; not a loop condition. D. It uses a loop condition; not an integer counter. E. Only consider this option if you checked alternative D above: It checks the loop condition a the BEGINNING of the loop, F. Only consider this option if you checked alternative D above: It checks the loop condition a the END of the loop,
Answer:
A and C
Explanation:
The for next loop is used for a fixed number of iterations which is usually indicated in the syntax. It uses a counter that increments on each iteration. The loop terminates when the counter reaches the number of initially specified iterations. It is different from a while loop which depends on a specified condition evaluating to the Boolean 'true'.
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access
Static NAT is the answer,. :) great question BTW!
What are three examples of information technologies you use in your everyday life? Which do you consider to be the most important to you on a daily basis and why?
Although IT is crucial to many other daily tasks, other examples of IT systems include the internet, mobile phone networks, broadcast radio and TV systems.
What information technologies use in your everyday life?Information technology has made it possible for people to connect with one another more quickly, simply, and affordably than ever before. Texting and making video calls are so easy these days. There are numerous apps available online that provide these services.
Therefore, radio and phone equipment for video conferencing. Individual computers, For handling goal-setting and performance reviews, use performance management software.
Learn more about information technologies here:
https://brainly.com/question/14426682
#SPJ1
Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer C++
Answer:
#include <iostream>
using namespace std;
int main() {
int start, end;
cout << "Enter start number: ";
cin >> start;
cout << "Enter end number: ";
cin >> end;
for(int n=start; n<=end; n+=5) {
cout << n << " ";
}
}
Explanation:
I output the numbers space separated.
Which range function creates the following list of numbers?
76 74 72 70 68 66 64 62
Answer:
they look like even number
Explanation:
2 4 6 8 10 12 -------seeeeee but not hundred percent sure but plz put me in brainlist
A cheetah has a mass of 50kg and can accelerate at 10 m/s2. This is equal to 500 Newtons which is the force the cheetah creates to run. Let's calculate how much work the cheetah does and how much power it generates when it runs 50 meters in 3 seconds.
Step 1: Determine how much work is done (measured in joules).
Multiply the force by the distance 500N×50meters= _______ joules
Step 2: Determine the power (measured in Watts).
Divide the work by the time it took to do the work 25,000joules÷3s.= _______ watts
Answer:
often, work done= Force<<* distance
so work done=500N * 50m
work done=25000J
also, Power=work done/Time taken
Power=25000J/3sec
Power=8333.333.....
what is presentation software in bussiness used for
Answer:
Presentation software is a category of application software that is specifically designed to allow users to create a presentation of ideas by stringing together text, images and audio/video.
Explanation:
Answer:
Presentation software is a category of application software that is specifically designed to allow users to create a presentation of ideas by stringing together text, images and audio/video.
Explanation:
Physical Geography of the Middle East
Answer:
Explanation:
He’s wright SS7G5 The student will locate selected features in
Southwestern Asia (Middle East).
a. Locate on a world and regional political-physical map:
Euphrates River, Jordan River, Tigris River, Suez Canal,
Persian Gulf, Strait of Hormuz, Arabian Sea, Red Sea, and
Gaza Strip.
b. Locate on a world and regional political-physical map the
nations of Afghanistan, Iran, Iraq, Israel, Saudi Arabia, and
Turkey
Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options
mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing
Answer:
A, B, E and F Brainliest please
Explanation:
what is the meaning of url
Answer:
it stands for Uniform Resource Locator.
Explanation:
Uniform Resource Locator: a location or address identifying where documents can be found on the internet.
Write a program that will have Tracy draw a stretched out slinky. The slinky should have: Five rings Each circle should have a radius of 35 Tracy should move forward 40 pixels after every circle
Solution :
The Tracy commands :
main.py
circle(35)
forward(40)
circle(35)
forward(40)
circle(35)
forward(40)
circle(35)
forward(40)
circle(35)
forward(40)
Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access the Customization option to create the new shortcut. Which two tabs should Jason select to place the Print Preview shortcut on the worksheet toolbar?
Answer:
New Tab (Custom) and New Group (Custom)
Explanation:
In order to accomplish this Jason needs to use New Tab (Custom) and New Group (Custom). The New Tab (Custom) will allow Jason to add a new tab with the Print Preview shortcut as a brand new tab in the software. Then using the New Group (Custom) tab, Jason can group the Print Preview shortcut with the worksheet toolbar so that it appears as part of the original toolbar with the rest of the tools available in the toolbar.
PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST
What is an example of a composite key in a database table?
InvoiceID
CustomerID
ProductID
OrderID + ProductID
Answer:
b
Explanation:
OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.
What is composite key?A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.
In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.
Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.
However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.
Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.
Thus, the correct option is 4.
For more details regarding composite key, visit:
https://brainly.com/question/10167757
#SPJ3
Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?
Wikipedia articles
competitor websites
government data
magazine opinion pieces
Answer:
Its governmental data
Explanation:
What file format is best to give a printer when working with Adobe InDesign?
GIF
TIFF
HTML
IDML
Answer:
TIFF
Explanation:
GIFs are animated image files, and printers can't print animations
TIFFs are basically image files
HTML is a coding file, you were to print it, it would print the HTML text of the image
IDML is an XML representation of an InDesign document or components, if you were to print it, its outcome would be basically the same as printing an HTML file.
True or False: The proze for winning the NHL champioship is called the
"James Norris Trophy."
True or False
Does anyone know this?
Answer:
DOCX merupakan file Microsoft Word Open XML Format Document. Ya, ini merupakan file yang tercipta dari pembuatan dokumen di Microsoft Word, aplikasi pembuatan teks bikinan Microsoft. File dengan ekstensi DOCX berbasiskan XML dan bisa saja mengandung teks, objek, style, formating, dan gambar.
SOMEONE PLS HELP ME
Alright so in problem solving class which I think is basically compsci we are working with Karel and conditional loops. The world we are using rn is called cleanUp. I need someone who is good at this stuff to help me ASAP!!!!!!! It’s due at 8:30 am tomorrow!!
When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender
For what purpose is IT used in business?
Answer:
Technology is used in various ways; businesses can use technology in manufacturing, improving customer care, transportation, human resource management, business communication, use technology to improve their services or products as a way of gaining competitive advantage .
Answer:
Technology is used in various ways; businesses can use technology in manufacturing, improving customer care, transportation, human resource management, business communication, use technology to improve their services or products as a way of gaining competitive advantage .
Explanation:
BRAILIEST PLZ!
solve each ratio 35:7
Answer:
5:1
Explanation:
Divide each side by 7
please help me with computing!
the question is:
solve the following algorithm in pseudocode "the algorithm is required to prepare a teacher's payroll. For them, the hours worked and the price per hour are taken into account. place the input data and the output data.
Answer:
ok i help
Explanation:
Ivan has five workbooks open. he has arranged these files in a specific grouping so he can view them at the same time. In order to save these files i this specific order, ivan must create a----
You are a part-time manager for The Mobile Vegan, a food truck catering to vegan diners in Portland, Oregon. Jessica Rosen, the owner of the business, wants to expand by adding other food trucks in Portland and the surrounding area. Whether she purchases new trucks or takes over an existing food truck business with an established clientele, she needs a loan to cover the cost of the trucks. She has asked for your help updating the workbook she created to analyze the loan information and forecast sales. Switch to the Loan Scenarios worksheet, and then calculate the monthly payment for the Add 1 Truck scenario as follows:
a. In cell D11, enter a formula using the PMT function to calculate the monthly payment for a loan.
b. Use the inputs listed under the Add 1 Truck loan scenario in cells D5, D7, and D9. (Hint: The result will be displayed as a negative number to reflect the negative cash flow of a loan payment.)
Answer:
i acc dont know
Explanation:
srry
What is the difference between PowerPoint and Outlook?
PowerPoint is a presentation program; Outlook is a personal information management application.
Outlook is a presentation program; PowerPoint is a personal information management application.
PowerPoint is a program that lets you create, edit, format, and print written documents; Outlook is a computer application that uses a grid system to organize and manipulate data.
Outlook is a program that lets you create, edit, format, and print written documents; PowerPoint is a computer application that uses a grid system to organize and manipulate data.
Answer:
PowerPoint is a presentation program; Outlook is a personal information management application.
Explanation:
Powerpoint is the program used in presentations where slides designed and then shown to the audience.
Outlook is used to display various types of personal information like calendar appointments and emails.
List four things that must be taken into consideration when evaluating different resources of information (and explain ANY ONE from the list)
Answer:
objectivitycurrencyaccuracyauthorityExplanation:
authority:is important to know if the information provided is reliable or not.
How does a filmmaker decide which events to include in a documentary?
Answer:
A documentary is a film based on facts in which the maker tries to portray an aspect of reality, such as politics, science, society or history, nature or the personal perception of the documentary maker.
Documentaries are informative in nature. Sometimes documentaries attempt to provide an objective picture of a subject. There is a lot of debate about what is objective, because the documentary maker chooses his images from reality, which is in itself a subjective act. In a creative author's documentary, the emphasis is on the subjective vision of the filmmaker.
Therefore, the documentary maker will select the events to include in the documentary according to the approach he or she wants to give to it, be it objective or subjective.
Raster graphics allows which of the following?
(A) Limited color effects
(B) Color blending capabilities due to tiny pixels
(C) Scalable image without pixilation
(D) Layouts
Answer:
(C) Scalable image without pixilation