1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
13

As you type your outline, click Demote to move a line of text

Computers and Technology
2 answers:
Bond [772]3 years ago
7 0

Answer:

B: in one level

Explanation:As you type your outline, click Demote to move a line of text in one level. You may also click Outline Level and then click a level name. Promote moves a line of text to the left, moving it out one level

polet [3.4K]3 years ago
5 0
<span>C. out one level. i hope this helps</span>
You might be interested in
please help me!!!!!! all of the following may be benefits of a technical or vocational college except
-BARSIC- [3]

Answer:

im not sure

Explanation: is their supposed to be a picture or something?

5 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
You are using Firefox as your
Hoochie [10]

Answer:

B. firefox add-ons..............

6 0
3 years ago
Explain the application of artificial applications.
qwelly [4]

Explanation:

AIAI or artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning and self-correction. Some of the applications of AI include expert systems, speech recognition and machine vision. Artificial Intelligence is advancing dramatically. It is already transforming our world socially, economically and politically.

AI was coined by John McCarthy, an American computer scientist, in 1956 at The Dartmouth Conference where the discipline was born. Today, it is an umbrella term that encompasses everything from robotic process automation to actual robotics. AI can perform tasks such as identifying patterns in the data more efficiently than humans, enabling businesses to gain more insight out of their data. With the help from AI, massive amounts of data can be analyzed to map poverty and climate change, automate agricultural practices and irrigation, individualize healthcare and learning, predict consumption patterns, streamline energy-usage and waste-management.

6 0
3 years ago
Read 2 more answers
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
-Dominant- [34]

Answer:

ping

Explanation:

its ping. im a computer science nerd :')

3 0
3 years ago
Other questions:
  • Before attempting the​ exercise, click here to watch a short video. Of the following list of tools used at Arnold Palmer​ Hospit
    14·1 answer
  • Sql provides the ________ technique, which involves placing an inner query within the where or having clause of an outer query.
    8·1 answer
  • When both gears are the same size what will they produce
    11·1 answer
  • Having one password for all accounts is an easy way to remember passwords, but it will expose you to what risk?
    15·1 answer
  • Any one have a snnaap chhhaatt if so i need help with something n there
    15·2 answers
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • ¿Que similitudes y que diferencias tenían el estado y la iglesia en el proceso de colonizacion de america?​
    6·1 answer
  • Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a pr
    10·1 answer
  • Plz help
    10·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!