1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
6

If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki

ng it bigger by adjusting it to be SmartArt by making it smaller by adjusting it to be a different style by making it thinner by making it thicker by adjusting it to be a different color by rotating it
Computers and Technology
2 answers:
lesantik [10]3 years ago
7 0
The first two make the most sense.
I hope this helps!
borishaifa [10]3 years ago
6 0

Answer: The correct answer is everything except adjusting it to be SmartArt. You can originally add it as SmartArt if you are adding the triangle through that feature.

Explanation: There are a number of ways that a triangle can be adjusted after being inserted into a diagram. The different ways include:

-by making it bigger

-by making it smaller

-by adjusting it to be a different style

-by making it thicker

-by adjusting it to be a different color

-by rotating it

You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
Which one of these are a valid IPv4 address?
Harman [31]

Answer:

1.1.1.1, 54.45.43.54, and 255.255.255.0

3 0
1 year ago
Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w
Vera_Pavlovna [14]

Answer:

Another way to block all inbound packets is to use the firewall layer of the circuit.

Explanation:

The firewall circuit layer is a firewall containing a table with four fields, mainly such as source port, destination port, source IP address, and destination IP address.

They are containing mainly the addresses or the ports that need to be blocked.   So we want to block all inbound packets, and also set the source port to 23 while the rest is set to zero, meaning that all inbound packets are blocked.

5 0
3 years ago
Iciples UI
Dmitriy789 [7]

Answer:A

Explanation: I took the test !

8 0
3 years ago
Is wireless or wired network faster??
bogdanovich [222]

Answer:

Wired

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • 1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?
    12·1 answer
  • Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
    10·1 answer
  • A supplier certification program: Group of answer choices
    9·1 answer
  • What is essential to delivering a successful presentation?
    5·2 answers
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!