1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
5

A star appears under the menu of the word processing program.

Computers and Technology
1 answer:
Aliun [14]3 years ago
3 0

Answer:

Under the menu option Insert.

Explanation:

You might be interested in
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Requests to access specific cylinders on a disk drive arrive in this order: 24, 20, 4, 40, 6, 38, and 12, and the seek arm is in
GarryVolchara [31]

Answer:

The time required to seek using First come,first served algorithm is 876 milliseconds.

The time required to seek using Shortest Seek Time First algorithm is 360 milliseconds.

The time required to seek using LOOK (initialing moving upwards) algorithm is 348 milliseconds.

Explanation:

Part a,b : First-come, first-served:

The order of the cylinders is as 10, 22, 20, 2, 40, 6, 38

10 + 12 + 2 + 18 + 38 + 34 + 32 = 146 cylinders = 876 milliseconds.

ii) Shortest Seek Time First:

The order of the cylinders is as 20, 22, 10, 6, 2, 39, 40

0 + 2 + 12 + 4 + 4 + 36 + 2 = 60 cylinders = 360 milliseconds.

iii) LOOK (initialing moving upwards):

The order of the cylinders is as 20, 22, 38, 40, 10, 6, 2

0 + 2 + 16 + 2 + 30 + 4 + 4 = 58 cylinders = 348 milliseconds.

7 0
3 years ago
A technician is building a workstation that is to be used as an HTPC and will sit next to the audio receiver. Which of the follo
loris [4]

Answer:

B, Mini-ITX

Explanation:

According to my research on information technology and it's hardware, I can say that based on the information provided within the question the technician is most likely to use a Mini-ITX case. This is because an HTPC is a A Home Theater PC which does not need all the hardware that a regular PC needs, just the minimum specs, and these devices are usually hidden away in a drawer or behind the TV. Therefore he needs the smallest PC case which is a Mini-ITX.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
2 years ago
Data erasure software uses standards that are called.
Leviafan [203]

Data erasure software uses standards that are called Typically, a software program device is used for information erasure like BitRaser, which implements the overwriting sample primarily based totally on the usual used, together with US DoD 5220.22, NIST 800-88.

<h3>What is statistics erasure?</h3>

For virtual garage devices, erasing names after its developer, the Gutmann set of rules is a way of disk wiping that overwrites statistics the usage of a complete of 35 passes. This makes it one of the maximum steady statistics erasure methods, however additionally the maximum time-consuming.

The statistics manner that zeros and ones are verifiably overwritten onto all sectors of the device. This renders all statistics completely unrecoverable at the same time as retaining the capability of the device the beyond few years, NIST Special Publication 800-88 has end up the go-to statistics erasure preferred withinside the United States.

Read more about the software :

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane,
oksano4ka [1.4K]

Answer:

Normal

Explanation:

3 0
3 years ago
Other questions:
  • _____ assures the interface will act as the users expect, while _____ assures it will look pleasing. Select one:
    14·1 answer
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • Write a program in Python that reads in investment amount, annual interest rate, and number of years, and displays the future in
    6·1 answer
  • What is the term for the era created by the digital revolution?
    5·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • How does this happen on brianly???
    5·2 answers
  • What is intellectual property rights law ?​
    8·1 answer
  • Could anyone please answer this?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!