Answer:
The JavaScript statement is
var str1 = "Information Technology";
var result = str1.toUpperCase();
Explanation:
JavaScript is used to validate the client side it means it provide the client side validation.
Following are the function of JavaScript that converted the string into uppercase.
function val()
{
var str1 = "Information Technology ";
var result = str1.toUpperCase();
}
The toUpperCase() function convert the string into uppercase in JavaScript
OUTPUT
INFORMATION TECHNOLOGY
The answer is to use the Ctrl and C keys on the keyboard to copy content from one workbook to another.
The Ctrl and C key is the standard combination keys on the keyboard that is used to copy any selected text or objects while in a user interface environment. Janice is required to press the C key while holding down the Ctrl key to copy all the content to the new workbook.
Another way of doing it is to make sure that both source and target workbooks are open. Navigate the sheets you want to copy or move in the source workbook. Click the Home tab and select then format dropdown in the Cells group. Select move or copy sheet option in the Organize sheet option. Choose the target workbook from the To Book dropdown and click OK.
The answer is B.
<span> desktop publishing program must be able to take text and graphics from a number of sources and allow these elements to be arranged on a page.
The main purpose of a destkop publishing program is to aid user in creating documents using its page layout so it could generate printable media with higher quality compared to the one that is handmade.</span>
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution