1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
13

Adam, a college student, downloads a document containing resume templates from the Internet. When he opens the document

Computers and Technology
1 answer:
pishuonlain [190]3 years ago
4 0

Answer:

B

Explanation:

Because I have used it and if you download any file it says protected view click here to enable editing

You might be interested in
Define cell in MS-Excel.​
Solnce55 [7]

Answer:

The intersection of rows and columns in a worksheet is called a cell

4 0
3 years ago
Read 2 more answers
A network administrator is examining a RIPv2 routing table and notices that several subnets are advertised in individual entries
Aleonysh [2.5K]

Answer:

B. Use the auto-summary command.

Explanation:

With the implementation of dynamic routing protocols, RIP summarizes networks at classful boundaries by default. To configure a router to automatically summarize networks, the auto-summary command would be used.

5 0
4 years ago
One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput
Lady_Fox [76]

Answer:

The answer is "The global Address List (GAL) is publishes in the new certificates".

Explanation:

Describe the GAL with relate to smart card:

  • The GAL is a part of the outlook, that allows the users to make a group of mutual contacts and resources specified for your G Suite domain and searchable directory.  
  • It provides the main mail app, that offers you to make global contacts, and also provides basic contact, with the use of business shares global addresses with others.  In this process, the co-worker can change their smart card.
5 0
3 years ago
A production house needs an operating system that captures, saves, and generates information within specific time. Which type of
Vlad1618 [11]
For hacking, you can use linux, but for normal use, use windows 8 or 10. Anything older than that is kind of boring
3 0
3 years ago
Hi my name is Maya how are you today I love brainy so much I juts don't want to ighn in so e jnxjkcsvwjnvhJCJSCB HBEFCHB XBS BHB
steposvetlana [31]

Answer:

Hey

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • I have Mac(the last version installed) and I use Wine (application for using windows files, programmes on mac) but I have some p
    6·1 answer
  • Write a loop to populate user_guesses with num_guesses integers. read integers using int(input()). ex: if num_guesses is 3 and u
    14·2 answers
  • A plan to budget time for studying and activities is referred to as a study routine. study habits. study skills. a study schedul
    13·2 answers
  • Role of computers in everyday life​
    15·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·2 answers
  • Among us Question. Worth 15 Points.<br> Which Vents do the Admin Vents Connect?
    14·2 answers
  • A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
    6·1 answer
  • Smart art is considered a​
    14·1 answer
  • Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be s
    5·1 answer
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!