1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
9

Use the drop-down menus to complete the statements about using section breaks in a document

Computers and Technology
1 answer:
krok68 [10]3 years ago
7 0

Answer:

layout, next page, continuous

Explanation:

just took it

You might be interested in
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Manufacturing changes what materials into useful products
Vlad [161]

Answer:

Raw Materials

Explanation:

Raw materials are the resources used by a company to produce its finished goods and products. some common raw materials are cocoa for beverages, limestone for cement etc

3 0
3 years ago
Daphne has determined that she has malware on her linux machine. She prefers to only use open-source software. Which anti-malwar
Llana [10]

Answer:

ClamAV is the open source antivirus you can in your Linux machine.

5 0
2 years ago
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
Working ____ means that you are viewing previously loaded or saved webpages in the browser, but you are not connected to the int
uysha [10]
Working offline is the answer
8 0
3 years ago
Other questions:
  • What is software piracy
    12·2 answers
  • When an object is selected, it is surrounded by ________, which allow you to change the size of the object.?
    5·1 answer
  • What is out put.what is data. what is microprocessor
    14·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • 3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate a
    15·2 answers
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors tha
    6·1 answer
  • For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
    7·2 answers
  • WHO WANT P O I N T S.................................................
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!