1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
3 years ago
9

How many typefaces should you use in business documents?

Computers and Technology
2 answers:
Assoli18 [71]3 years ago
5 0
It’s best to use two
Lina20 [59]3 years ago
5 0
At max 2 to keep it nice
You might be interested in
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
You can remove selected text from a slide by pressing the CTRL+X keyboard shortcut keys.
Dmitry_Shevchenko [17]

Okayyyyyyyyyyyyyyyyyyyyy

7 0
3 years ago
How do I create a videogame
mote1985 [20]

Answer:

-Learn how to code

-Make Character

-Design

-Go to classes

-Go on video game platforms and make an video game(rblx is the best in my opinion)

-Play video games and see the scripts

-Decide what type of video game your making(horror, family game, battle game, etc.)

Explanation:

3 0
3 years ago
What is the standard internet protocol, which provides the technical foundation for the public internet?
luda_lava [24]
You have to be carefull no bulling cuiberbulling people hurt there self for stuff like that
3 0
3 years ago
Which is not a renewable energy resource?
Lyrx [107]
Natural gas.


-----------------
3 0
3 years ago
Read 2 more answers
Other questions:
  • Because we live in a digital age and our presentations may be available for viewing for years to come, we have to be careful of
    14·2 answers
  • If you were asked to subnet a network in such a way as to arrive at 6 network ids you would need to borrow 2 bits.
    7·1 answer
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • What is computer hacking? describe some examples
    6·1 answer
  • (Please Help)
    13·1 answer
  • What to do when you strip a screw
    10·2 answers
  • What type of device is the keyboard?<br><br> Output<br> Input<br> Monitoring<br> Software
    7·2 answers
  • Describe the steps to play a presentation the way your audience will see it.
    8·2 answers
  • What file does a aac run under
    11·1 answer
  • An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input c
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!