Answer:
A) Array of buttons for<u> quick access </u>to commonly used <u>commands and tools</u>: Tool bar
That's what most people will use most of the time, to quickly perform the most common tasks.
B) <u>List of commands</u> to create, format and edit presentations: Menu Bar.
When the features listed in the tool bar aren't enough, we go to the Menu system, which lists all the features of the program.
C) <u>Provides info</u> about current slide<u> at the bottom</u> of the slide: Status Bar.
The status bar is always located at the <u>bottom of the screen</u>.
D) <u>Provides navigation</u> through the slides: Scroll bar.
Where you can scroll down and up your slides.
Answer:
Lowest Level; Machine Language.
Explanation:
The lowest level of a computer is machine language, which are strings of 0's and 1's in bits, and it's possible to perform tasks at this level. It's however difficult to do and humans created <em>Assembly</em>; a type of low level programming language to be readable, and converts to machine language so that we don't have to work in binary.
I will try to give you the best answer I can possibly come up with.
The easy way to get it is to store it into an array of strings and print the array of string backwards. You can do that by starting at the last part of the array down to the first letter.
Answer:
Negative transfer of learning
Explanation:
Negative transfer of learning occur when the knowledge you've acquired in the past is/are interfering with the one(s) you are currently acquiring.
Example: learning a new language that have some differences in pronunciation from the previous one, changing from a right-sided vehicles to a left-sided vehicles etc.
Answer:
(i) Prevention is more important than detection and recovery.
(ii) Detection is more important than prevention and recovery.
(iii) Recovery is more important than prevention and detection.
Explanation:
(i) Prevention is more important than detection and recovery.
Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.
(ii) Detection is more important than prevention and recovery.
Detection of an attack can be done through for example a security alarm can detect an attack and inform others.
(iii) Recovery is more important than prevention and detection.
Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.