<span>Open a document or presentation.Add or select a text box.<span>On the toolbar, click Bulleted list or Numbered list .<span>Note: If you don't see the option, click More.</span></span>To change the style of the bullets or numbers, click the dropdown arrow next to the icons in the toolbar</span>
Answer:
c
Explanation:
It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.
Answer:
it depends
Explanation:
if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.
if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.
ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.
Answer:
The i5.
Explanation:
It has a lower clock speed, but you do note that you have more cores, same with the cache memory.
Answer:
It balances a tree when a long path exist in the left subtree of the left of the root.
Explanation:
Rotation is an operation which is performed on the binary tree which changes the structure of the binary tree but it does not interfere with the order of elements.
A single right rotation strategy is basically for re balancing the tree.When there is along path which exists in the left subtree of the left of the root.