1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
8

Which Ribbon contains the paragraph attributes? Home Insert Review View

Computers and Technology
2 answers:
Lemur [1.5K]3 years ago
7 0
The Home ribbon contains the Paragraph attributes
kirza4 [7]3 years ago
5 0

Answer:

The Home ribbon contains the Paragraph attributes

Explanation:

You might be interested in
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
3 years ago
Select the correct answer.
ioda

Answer: D

Explanation:

6 0
3 years ago
Read 2 more answers
HTML5 is______because it works on tablet or smartphone,notebooks
jeyben [28]

Answer:

Wonderful and easy language

Explanation:

Hope this helps

3 0
3 years ago
Read 2 more answers
5) Write a regular expression would zip code + 4 fields of the forms: xxxxx-xxxx where x is any number but the last 4 digits cou
marusya05 [52]

Answer:

Following is the expression written in "Bash script" (mixture of commands):

^\d{5}(?:[-\s]\d{4})?$

Explanation:

  • ^ = For staring string (denotation).
  • \d{5} = Matching 5 digits (first five unknown x's)
  • (?:…) = Making Group (making group of former 5 digits)
  • [-\s] = Match a hyphen  or a space

                 (checking if a hyphen is present?)

  • \d{4} = Matching 4 digits (next four unknown x's)
  • …? = Pattern before it is optional
  • $ = Ending of the string.(denotation)

4 0
3 years ago
Other questions:
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Today encoding scheme has taken over ascII by what
    5·1 answer
  • State two functions of windows environment​
    9·1 answer
  • Given a Student class, create a class with following characteristics:
    6·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Consumer consequences for illegally downloading software
    6·1 answer
  • Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use
    5·1 answer
  • Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
    5·1 answer
  • ______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
    5·1 answer
  • What wireless security technology contains significant flaws and should never be used?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!