Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.
Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.
Answer :
Double click on boarder width an height will automatically adjust.
Manual procedure are following:
1.Open desire file of spreadsheet
2. Click on home tab in cell group and then click format.
3. Under cell size click on default width.
4. In standered column width box type new measurements and then click OK.
Explanation:
In Adobe illustrator cc (2017) , of the following export file formats cannot preserve transparency
The computerization of art meant that certain details and intricacy could be done which previously had been impossible give the limitations of the human body.
Answer / Explanation:
195.200.0.0/16
Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.
2ⁿ = number of subnets
where n is additional bits borrowed from the host portion.
2ˣ - 2 = number of hosts
where x represent bits for the host portion.
Assuming we have 195.200.0.0/25
In the last octet, we have one bit for the network
number of subnets = 2¹ =2 network addresses
number of host = 2⁷ - 2= 126 network addresses per subnets