1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
4 years ago
13

research the internet and develop a list of three important rules/standards you will give to the team to help everyone easily fi

nd documents in the future.
Computers and Technology
1 answer:
natima [27]4 years ago
6 0
The three important rules/standards that I can give to the team to help everyone easily find the documents in the future are the following:
1. Develop naming convention on how to define filename/documents.
2. All changes in the documents must be well documented, there should be a record of changes.
3.There must be a defined standard procedures on how to save and access the file, and who are allowed to modify the documents.
You might be interested in
Robin has four copies of her midterm paper saved to a single folder on her
podryga [215]

Answer:

d

Explanation:

i took the test

6 0
3 years ago
What are the responsibilities of the DBA and the database designers?
Ratling [72]

Answer:

Explanation:

DBA's main responsibility is making sure that there is enough CPU, disk, memory, and network bandwidth available, as well as making backups every so often. Meanwhile, the database designers/developers are responsible for investigating and implementing what the end-user needs and making sure that the database holds all of the information that the end-user will be using.

3 0
3 years ago
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
In Excel, by default, text is ____ in a cell.
Elanso [62]
<span>In excel, by default, the text is Left-alligned in a cell.
Usually, the text really is in left-aligned even in word documents. 
It's up to the user's preference to change the alignment of the text or do changes in any design.</span>
8 0
4 years ago
Using a custom animation effect, how do you make text appear on a slide letter by letter?
solong [7]

Answer:

Apply an entrance effect, and then set it to By letter in the Effect Options dialog box.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

To format an image on PowerPoint, you can either use the Artistic Effects or Picture Effects.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Using a custom animation effect, in order to make text appear on a slide letter by letter, you should apply an entrance effect, and then set it to By letter in the Effect Options dialog box.

3 0
3 years ago
Other questions:
  • Acomputer with a domain name is called a
    8·1 answer
  • Is an important and necessary step that precedes object-oriented programming?
    6·1 answer
  • How do you know what memory to purchase for your computer?
    10·1 answer
  • Does anyone know the answer to this question
    9·1 answer
  • Write a Bare Bones program that takes as input a value for X and places 4 times the value of X into the value of Z. The value of
    10·1 answer
  • Which of the following is a trend in Internet computing? People are shifting back to using desktop computers more than mobile de
    5·2 answers
  • 1 Which of these is not an Operating System ?
    7·2 answers
  • Please help 2 lazy to do! easy question
    10·1 answer
  • Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
    8·1 answer
  • FOR CALL OF DUTY MOBILE GAMERS PLS HELP!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!