1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
12

After modifying the font of the Subheading1 style, you notice that the font of Subheading2 has also changed. What is the most li

kely reason for this?
A. The Subheading1 style is based on the Subheading2 style.
B. The Subheading2 style is based on the Subheading1 style.
C. The styles are both based on a Subheading3 style.
D. The styles are based on the Normal default style.
Computers and Technology
2 answers:
navik [9.2K]3 years ago
8 0

<u>Answer:</u>

The correct answer option is B. The sub-heading 2 style is based on the sub-heading 1 style.

<u>Explanation:</u>

If you are modifying the font of the sub-heading 1 style in any document, you may notice that the font of the sub-heading 2 has also changes.

The reason behind this is that the style of sub heading 2 is dependent on the style of the sub-heading 1.

It is like a hierarchy that is to be followed by the style of all the next sub headings.

Elina [12.6K]3 years ago
6 0

Answer

B.Subheading 2 style is based on the Subheading 1 style


Explanations

It is possible to change the heading and subheading styles in Microsoft office.Any change which is made using the main Home tab toolbar causes the creation of an extra style which causes the formation of a major headings not consistent with each other.

You might be interested in
When replacing a thermostat or water pump, coolant drained from the cooling system should be ________.
Alchen [17]

Answer:

Explanation:

Disposed of in a contained way/recycled.

5 0
3 years ago
With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
vfiekz [6]

Answer:

EMAIL

Explanation:

3 0
3 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
Write a Raptor program that will generate a random number between 1 and 100; do not display the randomly generated number. Let t
zepelin [54]

Answer:

Explanation:

Let's do this in Python, we can first generate the random number from 1 to 100. Then compare that with the input number from the guesser.

from random import random

random_0_1 = random()

random_1_100 = 1 if round(100*random_0_1) < 1 else round(100*random_0_1)

for trial in range(3):

    guess = input('Guess the number: ')

    if guess == random_1_11:

         print('You guessed correctly!')

         break

    else:

         print(2 - trial + " remaining try")

8 0
3 years ago
Read 2 more answers
What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
Cloud [144]
<span>It uniquely identifies the location of each computer or device connected to the internet?</span>
7 0
3 years ago
Other questions:
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • Which of the following is an example of a formal business standard
    14·2 answers
  • What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
    9·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • Can you make copies of classified documents provided you alert others?
    6·1 answer
  • Please help! Answer this question if you know computer science very well. I need help with computer science.
    13·1 answer
  • What is the nearest ten cents of 453.56
    5·1 answer
  • Module 1 and 2 Coding Guided Notes Fill in your answers to each response as you read through the lesson pages in the coding cour
    11·2 answers
  • Question 1
    8·1 answer
  • List three features of the third generation of computers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!