1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
10

Certain fonts are easier to read from a distance than others. Which font should NOT be used in a presentation?Select one of the

options below as your answer: A. Times New Roman B. Helvetica C. Arial
Computers and Technology
1 answer:
marshall27 [118]3 years ago
8 0
Helvetica, considering Times New Roman and Ariel are neat and clear to read
You might be interested in
Help me. its due tonight
Novosadov [1.4K]
d- enjoy
b- national service !
5 0
3 years ago
​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database
jeyben [28]

Answer:

B. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

Explanation:

Certain departments will require certain information for certain processes. It is not recommendable for every user to access every information of the company as it may reveal vital information.

Hence, every role and department should be given certain privileges to information according to the tasks and needs of the role.

5 0
3 years ago
What is a boot sector
Neporo4naja [7]

Explanation:

A boot sector is the sector of a persistent data storage device which contains machine code to be loaded into random-access memory and then executed by a computer system's built-in firmware. Usually, the very first sector of the hard disk is the boot sector, regardless of sector size and partitioning flavor.

4 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
Which of the following is not a Data Pump file type?
mrs_skeptik [129]

Answer: C) Control file

Explanation:

Data dump file is the type of file which contain records of the table and the data in a database. It is also known as database dump which are use for backing up the content of data so that the data can easily be restored incase of data loss.

There are mainly three types of files that are mange by the data pump are:

  • Dump file are used to contain data in the database that can be used for move.
  • Log file is used to record the messages and data which are associate in an operation.
  • SQL file is mainly used to record the output of SQL file instruction.

Therefore, control file is not the type of dump file as it is not associated with the dump file operation.

6 0
3 years ago
Other questions:
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • How can an individual find career data?
    13·1 answer
  • What is not a common purpose for a research report?
    5·2 answers
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • A computer has been stored, uncovered, in a dusty closet for several months. Why might this situation cause the operating system
    13·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • What kind of word is the pronoun in bold letters?
    5·2 answers
  • Define a constructor as indicated. Sample output for below program:Year: 0, VIN: -1Year: 2009, VIN: 444555666// ===== Code from
    8·1 answer
  • In Excel, you can sort a table by one or more columns by.
    7·1 answer
  • Write the Python programs for the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!