Answer:
first question option is d
second is false
third is mark
Explanation:
5-The following are generic font
- serif
- sans-serif
- cursive
- fantasy
- monospace
6 - We can change image size using height and width. so it is false.
7 - we can highlight text using <mark> Marked text </mark>
<span>the answer is: the same background color on all visuals and no more than two colors for words.</span>
Answer:HUMAN RESOURCES AND PROCEDURE COMPONENTS
Explanation: Information systems are known to contain five components, these components help to describe the various aspects and importance of Information systems.
They Include The DATABASE AND DATA WAREHOUSE components(act as the store for all data), The COMPUTER HARDWARE(the physical components of the information systems such as computer harddrive etc)
THE COMPUTER SOFTWARE( the software which includes all the non physical and intangible assets of the information system),
THE HUMAN RESOURCES AND PROCEDURES COMPONENT( which gives instructions to the users).
THE TELECOMMUNICATIONS.
Answer:

Explanation:
The computation of the velocity by using the following formula is
As we know that

where,
Displacement is 10 meters
Total time taken is 30 seconds
Now placing these values to the above formula
So, the velocity of Dash is


We simply applied the above formula so that we can get the velocity and the same is to be considered
Answer:
And clicking the security tab option.
Explanation:
Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.
By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.