1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
7

Mark used the Cover Page gallery in Word to insert a cover page in his report but now he wants to delete it. To do so, he should

click the Cover Page button in the Pages group, and then click ____.
Computers and Technology
1 answer:
Minchanka [31]3 years ago
5 0

Answer:Remove Current Cover Page

Explanation:

Remove Current Cover Page  is the option that is particular for removing or deleting the present cover page from the Word. It can be removed if another cover page is required to put up or cover page is mistakenly inserted.

  • This option is present in Insert tab.It contains Cover Pages in Pages Group to vanish current cover page
  • According to the question,Mark should use Remove Current Cover Page  option from Pages group to eliminate the cover page that he does not want anymore in his report.  
You might be interested in
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based
Nikolay [14]

Answer:

Secure Sockets Layer (SSL)            

Explanation:

  • SSL is a  standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server).
  • SSL is a security protocol that transmits sensitive information securely.
  • As we know data transmitted between browsers and web servers is sent in the form of plain text.
  • If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  
  • So SSL makes the web servers and web browsers to communicate with each other securely.
  • When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate.
  • The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected.
  • Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it.
  • SSL certificate is used for authentication purpose.
  • For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.
5 0
3 years ago
When you use file explorer or windows explorer to delete a file from the hard drive, where does windows put the file?
Dvinal [7]
Trash bin

Reasons:

When you remove a file from the hard drive it is still written in binary code. So, windows places files in the *trash bin* if you did not want to delete it.
Unless USB or Removable flash drive, when you delete that it does not place any files in the trash bin.

6 0
3 years ago
Which type of page of replacement algorithm is Windows XP and Unix are using?
mel-nik [20]

Answer:

Windows XP uses the Local Page Replacement algorithm. It is a type of FIFO. In this, Pages are taken from processes using more than their minimum working set and Processes initialize with a default of 50 pages. XP monitors page fault rate and adjusts working set size accordingly.

UNIX uses the Global replacement Algorithm through Modified second-chance clock algorithm.  Here Pages are aged with each second and Pages that are not used for a long time will eventually have a value of zero.

7 0
4 years ago
Explain why you cannot the Apple OS install on a regular windows computer and vice versa, without the aid of a virtualization so
Phoenix [80]

Answer:

The reason is due to proprietary design of the Operating System (OS) which require a virtualization software to blanket or "disguise" the hardware (processor) borderlines of the computer onto which it is to be installed.

Explanation:

An Apple system that has the RISC processor and system architecture which has an operating system made entirely for the Apple system architecture

If the above Apple OS is to be installed on a windows computer, then the procedure to setup up the OS has to be the same as that used when on an Apple system, hence, due to the different processors and components of both systems, a virtualization will be be needed to be provided by a Virtual box, Parallels desktop or other virtualization software.

6 0
3 years ago
The following Python statement instructs the program to open a file for input.
Nimfa-mama [501]

The python statement that instructs the program to open a file for input is a false statement.

<h3>How to open file for input ?</h3>

The code above is a python code.

The python statement to instructs a program to open a file for input can be represented as follows:

The Python function open() is a built-in function that opens a file and allows your program to use it and work with it.

The open functions accepts a file(relative path to the file) and a string or character that indicates what you want to do with the file.

inFile = open("grocerydataFinalPY.txt", "w") is use to open a file and write on it.

learn more on python here: brainly.com/question/13696872

#SPJ1

4 0
3 years ago
Other questions:
  • When a computer restarts without a hardware power-down-power-up cycle, it is doing a _______________?
    9·1 answer
  • Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.​
    10·1 answer
  • PLEASE PLEASE PLEASE PLEASE HELP!!! I REALLY NEED HELP AND ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·1 answer
  • Which of the following is not one of the Fatal Four events that cause three out of five construction worker deaths? A. Caught in
    8·2 answers
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • To make slides in a PowerPoint Online application presentation have the same transition effect, select __________ on the Transit
    11·2 answers
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • Give atleast 10 examples of wearable technologies and its functions​
    10·1 answer
  • GIVING 10 or 20 POINTS for brainliest HELP ASAP!! Instructions Click the links to open the resources below. These resources will
    10·1 answer
  • Which action is a result of human error?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!