1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
9

By default, a word document generally displays in ____ view.

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
4 0
<span>By default, a word document generally displays in Print Layout view.
</span>The Print Layout view is on of the several viewing options (<span>Read Mode, </span>Print Layout<span>, or Web </span>Layout)  that change how your document is displayed.
The Print Layout view is useful if you're planning to print<span> the document, that is the reason why it is called Print Layout. </span>
You might be interested in
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
What is stored in alpha after the following code executes?
Andreas93 [3]

Answer:

3. alpha = {1, 5, 6, 7, 5}

Explanation:

Initially, we have that:

alpha[0] = 1;

alpha[1] = 2;

alpha[2] = 3;

alpha[3] = 4;

alpha[4] = 5;

For j higher than 2, we have that:

alpha[j - 1] = alpha[j] + 2;

So

j = 3

a[2] = alpha[3]+2 = 4 + 2 = 6;

j = 4

a[3] = alpha[4]+2 = 5+2 = 7;

The correct answer is:

3. alpha = {1, 5, 6, 7, 5}

6 0
3 years ago
Zoe runs a sports media website that caters to fans of many different types of sports. She's starting a Google Display Ads campa
Alex

Answer:

Affinity Audiences allow her to reach sports enthusiasts.

Explanation:

Affinity Audiences are usually TV-style audiences normally designed with the aim of trying to connect advertisers with the type of customers they are searching for online at any point in time. Google Ads uses this feature via the browser history of the user and the time spent on pages and then associates the users browser with a category of interest.

8 0
3 years ago
25 pts! If programmers cannot write an algorithm because the problem is too complex, which methodology can they use to reach an
Setler [38]

Answer:

D, most likely thats what I was taught .

3 0
3 years ago
The physical view of a database system refers to
tigry1 [53]

Answer:

C. how and where the data are physically arranged and stored.

Explanation:

The physical view as the name implies describes how and where the data are physically arranged in the database. This deals with the physical arrangement of data in the database. This user usually view the database in a logical way. e.g table. The physical arrangement is usually used by database specialists. There can be multiple logical view of a database but just a single view of the physical view.

8 0
3 years ago
Other questions:
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • ____ is a form of software that includes a wide range of built-in functions for statistical, financial, logical, database, graph
    8·1 answer
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
    7·1 answer
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • What are the data types in access​
    6·1 answer
  • what will be the Trade discount and Invoice Amount if the List Price is $400.00 and the Trade Discount Rate is 85%
    14·1 answer
  • 2 ways to make your computer work faster ( please help asap )
    6·1 answer
  • Pls help quick... will mark brainliest...
    15·1 answer
  • The tools, skills, knowledge, and machines created and used by humans is known as.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!