1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
13

To add the word "confidential" to the background of a page, users would need to _____.

Computers and Technology
2 answers:
maxonik [38]3 years ago
8 0
I believe it would be inserting a watermark (B)
mylen [45]3 years ago
4 0

Answer:

B . Insert. Watermark

Explanation:

You might be interested in
_____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
Dmitriy789 [7]
Software, which contains coded information that is almost like instructions for your computer.
8 0
3 years ago
You have a small company and want to keep your costs low, but it is important your employees share data. Which network would pro
Crank

Answer:

centralised

Explanation:

duhh

7 0
3 years ago
Read 2 more answers
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that su
viktelen [127]

Answer:

The correct answer to the following question will be option C.

172.16.80.1-172.16.87.254

Explanation:

IP Address: IP Address stands for Internet Protocol Address, a unique numerical label allotted to every computer network that are connected to the network of the computer and communicate through the internet protocol.

  • An IP address can be separated by periods and having four numbers that are called Octet. Range of IP address can be from 0 to 255.
  • We have to keep the first 21 bits and start setting all from the 22nd bit on to 0 (zero).
  • To get the suitable and the correct range of the address, we add and subtract 1 from the given broadcast address i.e.,172.16.85.0/21.

So, option C is the right answer and no other option is usable according to the given explanation and the address given by the administrator.

3 0
3 years ago
A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
rewona [7]

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

8 0
3 years ago
What type of database contains multiple collections of data that are related to one another cells
statuscvo [17]
The different types<span> of </span>databases<span> include operational </span>databases<span>, end-user </span>databases<span>, distributed </span>databases<span>, analytical </span>databases<span>, relational </span>databases<span>, hierarchical </span>databases<span> and </span>database<span> models. 

Source Bing</span>
7 0
3 years ago
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line?
    13·1 answer
  • In what stage of an algae or fungi life cycle are they able to reproduce spores?
    10·1 answer
  • Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n &gt; k ) return f( k, n - k ); else retu
    8·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • Tgif
    7·1 answer
  • Which activity is the best example of a negative habit that may result from
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!