1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
10

Using a personal computer to produce high quality printed documents.

Computers and Technology
1 answer:
allsm [11]3 years ago
7 0

Answer:

Desktop publishing

You might be interested in
Write code statements to create a DecimalFormat object that will round a formatted value to four decimal places. Then write a st
KonstantinChe [14]

Answer:

Following is the code in Java Language :

DecimalFormat form1= new DecimalFormat ("0.####");  // create an instance of                                                                                            .                                                                                            //DecimalFormat

System.out.println (form1.format(res)); // display the value in proper format

Explanation:

Following are the description of the program

  • Firstly we create the instance of DecimalFormat i.e  "form1"  that will round a formatted value to four decimal places. To create an instance or object of the class we can use a new keyword.
  • Finally, we print the format by using the format method.In the format method, we pass the variable "res".The System.out.println() is used to display the value of the format.
3 0
4 years ago
What is one concern associated with web-based applications?
damaskus [11]

Answer:

Security

Explanation:

If you dont have security, all the other will be broken, its like laws of physics

5 0
3 years ago
The word Only is absolute or qualified
Semenov [28]

The word "only" is absolute.

5 0
3 years ago
Read 2 more answers
The function of while loop is
Alona [7]

Answer:

B repeat a chunk of code until the condition is true im 88% sure

4 0
2 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Other questions:
  • Databases can have various objects some of which are tables, queries, forms or views, and reports objects. Each of these has fie
    14·1 answer
  • Read the following paragraph:
    9·2 answers
  • One megabyte is approximately __________.
    7·2 answers
  • Data ____ travel over the Internet from router to router until reaching their destinations.
    7·1 answer
  • C++ CODE
    6·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • Two strings, and , are called anagrams if they contain all the same characters in the same frequencies. For example, the anagram
    13·1 answer
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    15·2 answers
  • What is the alogarithm for solving the perimeter of a triangle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!