1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
8

Which functions are available in a Word table? Check all that apply.

Computers and Technology
1 answer:
dexar [7]3 years ago
3 0
All of them are available
You might be interested in
A commercial depicts a teenager on a skateboard vandalizing a brick wall. This is an example of:
Olenka [21]
Crime. Because vandalizing is a crime. And maybe in the commercial the narrator will say something like don't do crime or something.
6 0
3 years ago
Read 2 more answers
__________ is a collection of formatting options—such as a frame, a rounded shape, and a shadow—that changes a picture’s overall
LenaWriter [7]

Answer:

Picture Style

Explanation:

According to my research on the Microsoft Word Software, I can say that based on the information provided within the question the term being mentioned in the question is called a Picture Style. This is a feature in Microsoft Word that allows you to apply a style or effect to a picture in order to enhance the way it looks or presents, such as a frame, shadow, or shape.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture,
alekssr [168]

Answer:

Explanation:

In information technology, architecture plays a major role in the aspects of business modernization, IT transformation, software development, as well as other major initiatives within the enterprise. IT architecture is used to implement an efficient, flexible, and high quality technology solution for a business problem, and is classified into three different categories: enterprise architecture, solution architecture and system architecture. Each of these classifications varies in their implementation and design, depending on the contextual business scope, organization structure, and corporate culture.

Architecture Level

Architecture level represents the scope boundary and granularity of details the architectural activity should take, based on organization hierarchy and communication audience.

  • Enterprise Architecture (Company level) aligns technological strategies and execution plans with business visions and objectives by providing architectural oversight and guidance. Enterprise architecture also drives consolidation, reuse, and economy of scale by addressing company-wide goals in a holistic way across all IT projects.
  • Solution Architecture (Department level) models a solution vision that defines the IT systems, business processes and reusable services for a specific business unit, spanning across business and technology architectures.
  • System Architecture (Team level) defines the structure of an information system in terms of various subsystem components and their relationships with internal and external systems. System architecture focuses on application, data, and technology, and is called software architecture in some organizations.

Before making decision regarding system architecture the designer must consider the following points:

  • Corporate organization and culture: System architecture must study day-to-day functions of business and users in order to understand corporate organization and culture. This will help in focusing on operational feasibility which will help in deciding other checklist items.
  • Enterprise resource planning (ERP): Most of the organization use ERP software these days and it is important for the analyst to understand the compatibility of the ERP which is used to the proposed system.
  • Total cost of ownership (TCO): System analyst must try to get solutions of different questions which helps in finding initial cost and cost which may add up during the development, which is total cost of ownership. This is most important at this will determine total cost and budget of system.
  • Scalability: Determining system ability to expand or downsize according to business requirements.
  • Security: What security system and policy needs to be implemented.
7 0
3 years ago
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • A circuit has a resistance of 300 ohm and a current of 0.024 A. What is the voltage in the circuit?
    12·1 answer
  • How do you design video games
    5·1 answer
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • Special effects are added using the _____.
    16·1 answer
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • Repl.it Assignment 4.1.2 (Guess the Number)<br> Please help me<br> I will give brainliest and a like
    10·1 answer
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    7·2 answers
  • Function of pons for class 7​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!