1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
12

Help please hurrry asap I WILL MARK BRAINLEST

Computers and Technology
2 answers:
Yakvenalex [24]3 years ago
5 0

Answer:

4) design tab, Page layout group

Explanation:

jarptica [38.1K]3 years ago
4 0

Answer:

3 insert tab, tables group

You might be interested in
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
1 year ago
Member function definitions: ______________.a. Always require the binary scope operator (::)b. Require the binary scope operator
lilavasa [31]

Answer:

Option (B) is the correct answer to the following questions.

Explanation:

The following option is correct because the binary scope operator is used to define the global variable only when the local variable has also the same name and we want to use global variable also or we also use scope operate when we do not want to use any function inside the class.

The following option (A) is wrong because we not always required binary scope operator and the option (C) is wrong because we cannot use the scope operator anywhere and the option (d) is already wrong because that binary scope operator would not be used in the function prototype.

7 0
3 years ago
If you are working in a word-processing program and need to learn more about its features, the best place to get assistance is f
jek_recluse [69]

Answer:

Either the help section in the program or Google

8 0
3 years ago
What are some good apps to download to screenshot your screen?
LenaWriter [7]

Answer:

AZ Screen Recorder.

Firefox ScreenshotGo Beta.

Screenshot Touch.

Screen Master.

Most personal assistant apps

7 0
3 years ago
A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
Maslowich

Answer:

<em>The following techinical options that would provide the most preventive value would be LETTER D.</em>

Explanation:

<em>Updating the antivirus is the best way to keep your computer free of malwares, trojans, and other kinds of threats. When you update your computer software and antivirus constantly, you prevent damages such as: data loss, computer invasion, and hacking attacks. </em>

<em>Following the correct computer practice and keeping your system constantly updated is the best way to protect your machine from any threat. </em>

<em></em>

4 0
4 years ago
Other questions:
  • One of the disadvantages of cable technology is that:
    7·1 answer
  • EBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general
    5·1 answer
  • What are some ways to accomplish full-duplex (FDX) digital communications on guided medium at the physical layer (OSI Layer 1)?
    7·1 answer
  • Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and per
    7·1 answer
  • Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
    6·1 answer
  • • Open your Netbeans IDE and answer the following question
    5·1 answer
  • p25: File Write and Read1) User enters a file name (such as "myMovies.txt").2) User enters the titles of 4 of their favorite mov
    12·1 answer
  • )
    11·1 answer
  • Manufacturing changes what materials into useful products
    6·1 answer
  • Continue your S3 and S4 assignment for a young soccer league with the following specification. Do not include the previous queri
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!