1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
11

What's the best option if you can't show your PowerPoint presentation at all? A. Create PDF/XPS Document B. Prepare a Package Pr

esentation for CD C. Create a Video D. Present online
Computers and Technology
2 answers:
Zina [86]3 years ago
6 0

Sometimes, even after preparing your presentation as well as you can with a presentation software such as Microsoft PowerPoint, you end up in a situation where you are unable to present your efforts because of file formatting problems.

If you find yourself in such situation, you should (A) create PDF/XPS document as a backup, so you can still show your presentation in its most basic form.

WARRIOR [948]3 years ago
6 0
A - Create PDF/XPS document

This is because this allows those even without PowerPoint to view the document online and via different sources.

Hope this helps!
You might be interested in
I need some help with ideas
Troyanec [42]

Answer:

Maybe make a loud noise when there is an unacceptable speed

Explanation:

If you speed above the limit you will get a ticket to if it makes a loud noise you can be annoying and speed at the acceptable speed

5 0
3 years ago
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
Write the statement that includes a friend function named before in the class dateType that takes as parameters two objects of t
Lerok [7]

Answer:

In opp friend function is a function that gives the same access to private and protected data. It is declared in class that is granting access.

Explanation:

#include<iostream.h>

using namespace std;

class Sum

{

 int a, b, add;

 public:

 void input()  

{

 cout << "Enter the value of l and m:";

 cin >> l>>m;     taking input from users

}

 friend void add(sum &t);

 void display()  

{

  cout << "The sum is :" << z;

}

};

 void add(sum & p)  

{

  p.add = p.a + p.b;

}

 int main()  

{

  sum p1;

  p1.input();

  add(p1);

  p1.display();

  return false;  

if(display==5)  

{

 return true;  //true is returned if sum is equal to 5

}

else        //if they are not the same

{

 return false;

}

}

8 0
3 years ago
What has information technology made piracy possible?
Bond [772]
Well, more and more people are buying products and then uploading them online so that other people, who may not have the money or just don't want to buy them can download them for free. Of course, this is illegal, however it is a common practice all over the globe. Even if you are not downloading, but rather just watching a show on a website where you don't have to pay for it - it is still piracy.
5 0
4 years ago
Which two characters do you use to tell the command that you are finished providing options and that the remaining data on the c
sergiy2304 [10]

Answer:

Two hyphen-minus characters (- -)

Explanation:

Using two hyphen-minus characters only, tend to recommend that the rest of the data are arguments and should not be treated as alternatives.

Hence, in this situation, the two characters a user will use to tell the command that a user is complete giving options and that the rest of the data on the command line is arguments is known as "two hyphen-minus characters (- -)"

8 0
3 years ago
Other questions:
  • 3.34 LAB: Mad Lib - loops in C++
    14·1 answer
  • You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
    10·2 answers
  • How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
    15·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ___
    14·1 answer
  • Which statement describes a mobile device feature? Docking stations can add some functionality to mobile devices such as video o
    11·1 answer
  • How many votes does a candidate need to become president of the US ?
    12·2 answers
  • Which is an example of an input device?
    6·2 answers
  • Create a flowchart that assigns a counselor to a student.
    9·2 answers
  • What should you implement to leverage power, cooling, and networking capabilities independent from other datacenters in a region
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!