1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
6

99 points!!! What would happen to the document if the change “A” is pointing to was accepted? a. There would be no changes. b. “

terrific” would be inserted into the document. c. “terrific” would have a strikethrough effect. d. “terrific” would be deleted from the document.

Computers and Technology
2 answers:
Sophie [7]3 years ago
3 0
Probably, terrific would be inserted
andrey2020 [161]3 years ago
3 0
<span>“terrific” would have a strikethrough effect.</span>
You might be interested in
Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not
Olenka [21]

Answer:

Following are the method to this question:

def __init__(self, _name, _breed):#defining Constructor

       """ Constructor """

       self.name = _name#assigning value in name variable

       self.breed = _breed#assigning value in breed variable

       self.tricks = []#defining tricks an empty list

Explanation:

In the above code, a parameterized constructor is defined, that hold two-variable "name and breed" in its parameter, and another object self is created for storing the value.

Inside the constructor two-variable, and one empty list variable "tricks" is defined that hold value in the name and breed variable, and the next step an empty list is defined, that store its value.

7 0
2 years ago
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
3 years ago
Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
iogann1982 [59]
The correct answer is $59,000. 
5 0
3 years ago
Read 2 more answers
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
9 months ago
Your teacher needs to keep track of a biology experiment's results for all students, to help calculate the grades. Which applica
IRISSAK [1]

Answer:

I think notepad is best suited for this task...

3 0
3 years ago
Read 2 more answers
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • ____ is a limited version of windows that allows you to use your mouse, screen, and keyboard but no other peripheral devices.
    14·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • Norman recently joined a team of technicians who work face-to-face. The team members have the expertise and experience needed to
    13·1 answer
  • Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
    8·2 answers
  • How to hack my neighboor wireless?​
    6·1 answer
  • Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method
    8·1 answer
  • Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
    11·1 answer
  • PLZZ HELP
    11·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!