1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
10

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
In-s [12.5K]3 years ago
7 0

Answer:

The answer is "Insert tab".

Explanation:

In the presentation slide components constantly refer to the artifacts in many other presentation software from, which you can bring from the inside of a slide. It involves things like forms, texts, images, videos, and even audio files.  

  • This Insert tab can be found at the head of the PowerPoint software in the toolbar.
  • It allows you to modify the slide, and it also provides a feature to count the number of columns and rows in the table.
You might be interested in
For demultiplexing a UDP socket is identified by:_____.
Nikolay [14]

Answer:

1. Destination IP address

2. Destination Port number

Explanation:

Demultiplexing is a term that describes a procedure of transforming a signal that has multiple analog or digital signal flows into different initial and unconnected signals.

Hence, in this situation, the correct answer is that for the demultiplexing process, a UDP (User Datagram Protocol) socket is identified by both the destination IP address and destination port number

3 0
3 years ago
Highlights the possible risks and problems that should be addressed during the implementation process
Llana [10]

Answer:

The answer is below

Explanation:

Since the type of Implementation is not stated specifically, it is believed that, the question is talking about ERP Implementation, because it is related to subject in which the question is asked.

Hence, Enterprise Resource Planning (ERP) implementation deals basically, by carrying out installation of the software, transferring of finanancial data over to the new system, configuring application users and processes, and training users on the software

ERP Implementation Risks involve the following:

1. Inefficient Management and Project Activities.

2. Inadequate or No Training and Retraining of Customers or End-Users.

3. Inability to Redesign Business Processes to meet the Software requirements.

3. Incompetent or lack of Technical Support Team and Infrastructure.

4. Incapability to Obtain Full-Time Commitment of Employee.

5. Failure to Recruit and Maintained Qualified Systems, and Developers.

6 0
3 years ago
What can be controlled through IoT? Choose four answers.
BaLLatris [955]

Answer:

Door locks

Light switches

Security cameras

Thermostat

Explanation:

IoT is internet of things that means network of different things that are interconnected through internet and make the decision with the help of Electronic sensors. The sensor sense the data from environment at different times and send this to the cloud (that may be the server). On the basis of this data different devices such as door looks, light switches, security cameras and thermostat take decisions with the help of controllers and change their current state.

<u>For Example</u>

In case of door look, there may be sensor that is sensing the finger prints of the user and after recognizing the person the door will be unlock. If unauthenticated user will try to open the lock a message has been sent to concerned. The training data of the the authorized persons is saved on the cloud, whenever someone tries to access, the data from sensor and cloud send to controller for making comparison and decision. So we can say that Door lock can be controlled IoT.

In case of light switches, there are few sensor available to sense the intensity of life. Different training values of that sensors are stored on the cloud. Whenever these sensors sense the light intensity, they send the data to the cloud contentiously, whenever the data match with darkness intensity, a signal has been send from controller to the switch to ON the lights.

Same as in cameras and Thermostat both are sending data to the cloud and controller. With the help of different image processing techniques and sensor camera will take the decision related to face recognition. Thermostat devices are also on and off by variation of temperature.

7 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
Eight houses represented as cells are arranged in a straight line java int state []
monitta

Answer:

int state[] = new int[8];

8 0
4 years ago
Other questions:
  • A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
    11·1 answer
  • "Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w
    9·1 answer
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    12·1 answer
  • Graphic Designer A says that a halftone is an image created from a photograph and is comprised of a
    8·2 answers
  • A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:
    8·1 answer
  • What is the most important job of a web server?
    11·2 answers
  • Anybody want to help me figure out how to put this on a resumè
    12·1 answer
  • Please help me with these questions please
    15·1 answer
  • Peter has recently bought a media player and a digital camera. He wants to buy a memory card for these devices. Which memory dev
    11·1 answer
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!