1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
15

HELP ASAP!!!

Computers and Technology
1 answer:
wolverine [178]3 years ago
6 0
The answer on this scenario is B.home. It is the tab being used then in order to have slide layouts, fonts for the formatting and adding images. Also the change in font color can be done. Hope this would be of help.
You might be interested in
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
2 years ago
. What is a computer network? *
Citrus2011 [14]

Explanation:

Pretty sure its a group of two or more computers that are linked thogether

7 0
3 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
I am trying to go into my outlooks, email but it says. :-( Something went wrong You're currently signed in as ||my hotmail|| . P
Ksju [112]

Answer:

ok???

Explanation:

4 0
2 years ago
You're going to be mowing lawns as a summer job. How long will it take for your
ahrayia [7]
Hshshshhshshs 3. 4 hours
8 0
3 years ago
Other questions:
  • The border that defines the outer boundary of a shape or other object
    13·1 answer
  • William found out that someone used his report on American culture without his permission. What is William a victim of?
    13·2 answers
  • Forensic computer investigators must _____.
    6·2 answers
  • 50 POINTS!!!!
    8·1 answer
  • Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
    10·1 answer
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
  • How to transfer mysql database from one server to another
    6·1 answer
  • Clara works behind a computer all day. She gets a lot of headaches, and her eyes have been hurting her lately. Her doctor diagno
    15·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!