1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
2 years ago
5

In this activity, you will create a Portable Document Format (PDF) version of a photography career résumé. You will include all

the relevant detalls in the résumé to enhance the presentation. You will state your work experience, achievements, education, and other information that will help you get an edge over other applicants.​
Computers and Technology
1 answer:
Troyanec [42]2 years ago
4 0

Answer:

Use Adobe Acrobat or another software that enables you to create a PDF.

Explanation:

Download Adobe Acrobat from the official website.

Once you've installed the software, follow the instructions of your assignment. A good example of a resume for a photography career can be found through a web search, any should do.

Once you've opened up the program, you'll find the tools in the toolbar to help you organize the resume however you'd like it to look. It doesn't matter how you structure the resume, what matters is that you include all of the necessary information asked of you for your assignment.

You can look up important details that should be included in your resume online through a web search.

I hope this helps! And good luck!

You might be interested in
What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
a_sh-v [17]

Option D is the answer because Digital Certificate is an entity that generates electronic and distributes them upon proving their identity sufficiently. In early days there was issues with people using the certificates that were not even issued by the organizations. Today it's a cryptographic technique which uses digital signatures and gives users a digital certificate that can be authenticated anytime online by any organization and is unique for every user having it.

Option A cannot be the answer because it has nothing to do with the identity of person but rather it is for specific fields.

Option B is not answer because it has no key and score matter to do with it.

Option C Web transactions has nothing to do with the certificates.

8 0
4 years ago
6. A rental car agency classifies the vehicles it rents into four categories: compact, midsize, full-size, and sport utility. Th
Tju [1.3M]

Answer:

there are no possibilities

Explanation:

A class / subclass relatonship is not going to be possible here.

This is because we have these four caegories namely

1. compact,

2. midsize,

3. full-size, and

4. sport utility

These four categories have no real unique relationship or attributes with an entity type. A minimum of a supertype has atleast one subtype as well as following the total specialization situation.

7 0
3 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
? Which console was the first to use CD-ROM storage? PlayStation Atari Jaguar PlayStation 3 Xbox 360
kaheart [24]

that is incorrect! Playstation is the correct answer

7 0
3 years ago
Which process helps to find files on your computer easily?
vekshin1

Answer:

1. a 2. a or c

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • Which certification can help enhance your job prospects in the role of a computer programmer?
    6·2 answers
  • Mohammed's parents learn that his classmates have
    7·2 answers
  • The United States is the only country in the world in which organs and tissue transplants are performed. True or False?
    8·1 answer
  • You want the user to enter the length, width, and height from the keyboard. Which cin statement is correctly written?
    10·1 answer
  • Project: Math Tutor Program with Error Handling
    9·2 answers
  • JAVA NEED HELP ASAP
    7·1 answer
  • Im learning about AI in my class and I'm confused about these two questions
    9·2 answers
  • In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
    10·1 answer
  • What is the maximum number of extended partitions can you have on a hard drive?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!