Explanation:
This question can have both answers that is yes as well as no.
1.Yes, it can serve as an editor who completes your content and ensures it will read well to others.
2. No, the editor should have tracked changes which would have shown you where they would apply recommended edits.
Word Processing Programs cannot be used for DTP
Explanation:
DTP software cannot be replaced with Word Processing Programs. DTP software is used for creating publishing document like post card, business card, calendars, and books where as the word processing software is used for creating and editing predominantly text document and once can edit text, copy, paste , delete and format text. Word processor relies heavily on editing of the contents rather than graphics or page layout where as DTP software is used to create image heavy newsletters, magazines, adverts, and brochures where layout is important.
Answer: File
Explanation:
In PowerPoint _file_ management is extremely important and you must keep track of what links, files, and programs are placed in which folders.
File Management is extremely important because it is necessary for effective system administration.
A good file management system in powerpoint makes compactness, data retrieval and editing achieveable.
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.