1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
9

You want to create a hyperlink within your document to the sec web site. which type of link do you create?

Computers and Technology
1 answer:
snow_lady [41]3 years ago
4 0
An Existing file or web page. 
You might be interested in
What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex
nata0808 [166]

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

7 0
1 year ago
The logical view Select one: a. shows how data are organized and structured on the storage media. b. presents an entry screen to
Nana76 [90]

Answer:

The answer is "Option d'.

Explanation:

The database provides a single graphical view of the data, but it  provides the facility to use logical view concept, that uses by view command, that uses the dataset to provide a logical view, that shows data according to user condition, and certain options were incorrect which can be described as follows:

  • In option a, In logical viewing data, it is not used.
  • In option b, It doesn't represent entry screen it simply shows detail.
  • In option c, this command doesn't allow you to create duplicate data.
4 0
3 years ago
Descuss the five generations of Computer language
Fiesta28 [93]

Answer:

Explanation:

The programming language in terms of their performance reliability and robustness can be grouped into five different generations, First generation languages (1GL) Second generation languages (2GL) Third generation languages (3GL)

6 0
3 years ago
In what Career Cluster you get to design, build, and destroy things
vaieri [72.5K]

Answer: Architecture

Explanation:

A career cluster can be defined as the group of careers in which professionals are related to common features or occupational tasks are related based on the common features. One person in a career cluster may like more than one job profiles in the same career cluster.

In architecture a person may like to design, build and destroy things to redesign them again. This involves knowledge, skills, mental and physical labor. Building and road constructions are the tasks performed by the architectures.

7 0
3 years ago
Member function definitions: ______________.a. Always require the binary scope operator (::)b. Require the binary scope operator
lilavasa [31]

Answer:

Option (B) is the correct answer to the following questions.

Explanation:

The following option is correct because the binary scope operator is used to define the global variable only when the local variable has also the same name and we want to use global variable also or we also use scope operate when we do not want to use any function inside the class.

The following option (A) is wrong because we not always required binary scope operator and the option (C) is wrong because we cannot use the scope operator anywhere and the option (d) is already wrong because that binary scope operator would not be used in the function prototype.

7 0
3 years ago
Other questions:
  • You have been tasked with training end users in security best practices and have observed a trend among users in which many are
    14·1 answer
  • How do I cancel my membership or Subscription on here
    11·1 answer
  • A culture that emphasizes verbal communication skills is ____________.
    9·2 answers
  • What character separates the file extension and the filename?
    13·2 answers
  • Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy
    6·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • Which of the following activities are performed by computer programmers? Choose all that apply.
    5·1 answer
  • . Describe a way to simplify a complex problem.
    8·1 answer
  • 1. Why does a computer have different types of ports?
    14·2 answers
  • This ingredient is often used as decoration for both hot and cold dessert​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!