1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
7

This type of handout prints only the text of the presentation.

Computers and Technology
1 answer:
zzz [600]3 years ago
7 0

The answer is : Outline.  The Outline prints only the text in the slides, without images. Outline is this type of handout that prints only the text of the presentation i  PowerPoint.

You might be interested in
To create a multi-column and multi-row box for users to type into in an html form, use the ____________ tag pair
alexgriva [62]

To create a multi-column and multi-row box for users to type into in an html form, use the <textarea></textarea> tag pair.

<span>The html tags are the codes or the hidden keywords in the web browser to tell about its format and displayed content. The html tags mostly comes in pairs, pair consist of the start tag and end tag.</span>
4 0
3 years ago
Explain agile testing ​
melomori [17]

Answer:

Explanation:

Agile testing is software testing that follows the best practices of Agile development. For example, Agile development takes an incremental approach to design. Similarly, Agile testing includes an incremental approach to testing. In this type of software testing, features are tested as they are developed.

5 0
3 years ago
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
What is the best thing about Tuesday’s in general? Why?
Stolb23 [73]

Answer:

tbh I really don't know what you mean

4 0
3 years ago
Which code is an example of XHTML?
lidiya [134]
D, because it’s the only one in html format
8 0
3 years ago
Other questions:
  • Research the disadvantages of the computer and explain them.​
    15·1 answer
  • Every node (except of the last node) in a singly linked list contains ____
    5·1 answer
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    10·1 answer
  • Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
    6·1 answer
  • What is the web of trust
    7·2 answers
  • What would a digitizing application create?
    13·2 answers
  • How has the global marketplace used emerging technologies to expand businesses
    14·1 answer
  • The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for softw
    13·1 answer
  • Case Project 2-1: The Differences Between IPv4 and IPv6 You are a network engineer for an IT consulting firm named F1IT. One of
    5·1 answer
  • What is a very important difference there between the wiring of an electromechanical thermostat and an electronic programmable t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!