1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
3 years ago
6

Mary is writing an article about the software development life cycle. She wants to place a flowchart besides the text. Which men

u should Mary choose for the purpose mentioned below?
Computers and Technology
2 answers:
vichka [17]3 years ago
4 0
The answer to this question is that Mary should choose insert image . Then, in the wrap text Mary should choose “top and bottom” to add it below the text she wrote. Using the option Top and bottom - text appears at the top and bottom of the image.
Anastasy [175]3 years ago
3 0
The menu option which Mary should choose is insert image.She should begin by going on the menu,choose the insert tab within the ribbon and then choose shapes.The shape tool provides a basic selection of shaped objects  that can be inserted  and edited onto the document.Under the shapes she will find various options  like arrows,lines,callouts,flowcharts e.t.c.Then she choose flowcharts.
Then in the wrap text Mary should choose "top and bottom "to add it below the text she wrote.using the top and bottom text appears at the top and bottom of the image.
You might be interested in
If a movie, song, or book is offered for free, is it malware?
ElenaW [278]

Answer:

Yes

Explanation: If the something is a site or app offering free downloads or streams of well-known movies, popular TV shows, big-league sports, and absorbing games, the hidden cost is probably malware.

3 0
3 years ago
Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
Serhud [2]

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

3 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two
Feliz [49]

Answer: Compiler translates high level source program into a equivalent target program (machine language).

An interpreter implements a virtual machine whose "machine language" is the high-level programming language. The interpreter reads statements in that

language more or less one at a time, executing them as it goes along.

Explanation:

give brainliest please

5 0
3 years ago
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
2 years ago
Other questions:
  • If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
    7·1 answer
  • Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
    7·1 answer
  • How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to acce
    15·2 answers
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • Gina is driving her car down the street. She has a teddy bear sitting on the back seat. A dog runs in front of Gina's car, so sh
    15·2 answers
  • A lookup field allows the user to select from a list of values when updating the contents of a field. true or false.
    11·1 answer
  • Select the correct answer.
    15·2 answers
  • Which statement is true?
    13·2 answers
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
  • Which of the following is ture?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!