1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
4 years ago
7

Really need Help!!!!! 

Computers and Technology
2 answers:
Alex Ar [27]4 years ago
8 0
She should adjust the column width to show the headings
Snowcat [4.5K]4 years ago
3 0

It's a, it's the only answer that makes sense and still keeps the heading

You might be interested in
Queries in Access can be used ______________
Alenkinab [10]
A query is an Access object used to view, analyze, or modify data. The query design determines the fields and records you see and the sort order.
6 0
3 years ago
Every employee of your company has a Google account. Your operational team needs to manage a large number of instances on Comput
Blizzard [7]

Answer:

Generate the fresh set of SSH keys. Offer every member of the team that private key. Customize the public key as a public SSH key for a project in the Cloud Platform project as well as require public SSH keys for each instance

Explanation:

Almost many person seems to have a google profile at their corporation. The vast amount of incidents on Compute Machine have to be handled by the operating staff. Any team member just requires operational accessibility towards the network. The safety department needs to ensure that credentials are distributed in such an administratively efficient way and have to be prepared to recognize that has accessed the specified case.

So, they are creating the latest key set for SSH. Offer every members of the team their private key. Customize its public key as just a public SSH key for such a program in the Cloud Platform project as well as require public SSH keys for each instance.

7 0
4 years ago
A web based application that integrates html code with business logic is said to be in violation of what design principle?
adoni [48]

A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

<h3>What is Html?</h3>

The Hypertext Markup Language or HTML stands for the standard markup language for documents developed to be displayed in a web browser. It can be administered by technologies such as Cascading Style Sheets and scripting languages such as JavaScript. HTML (Hypertext Markup Language) exists as the code that is used to structure a web page and its content. For example, content could be structured within a group of paragraphs, a list of bulleted points, or using photos and data tables

The protected variations pattern protects components from the variations on other elements (objects, systems, subsystems) by wrapping the direction of instability with an interface and operating polymorphism to make various implementations of this interface.

Hence, A web-based application that combines HTML code with business logic exists said to be in violation of Protection from variations design principle.

To learn more about Hypertext Markup Language refer to:

brainly.com/question/5560016

#SPJ4

5 0
2 years ago
What are the different components of the cloud architecture?
sashaice [31]

Cloud computing architecture can be described as components and subcomponents required for cloud computing. Typically, these components consist of front (fat client, mobile device, thin client) and black end platforms (storage, servers), a cloud based delivery, and a network (Internet, Internet, Cloud). When all of these components are combined, they make up a cloud architecture.

3 0
3 years ago
Which infection sends information to your computer through a third party
Daniel [21]

Answer: Spyware

Explanation:

Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party

8 0
3 years ago
Read 2 more answers
Other questions:
  • What are the functions of a motherboard??
    6·1 answer
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • A color tv uses red, green, and blue phosphors to produce the colors that we see. in printing, however, we use magenta, yellow,
    10·1 answer
  • "Memory refers to: A.the brain processes involved in the encoding, storage, and retrieval of information. B.the mechanisms drivi
    9·1 answer
  • A _____ is inserted so that a portion of a document that can have different formatting from the rest of the document. a. heading
    9·1 answer
  • Windows XPProfessional and Windows Vista Both have same devicedrivers.<br> True<br> False
    5·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • The date your Science project is due should be recorded on a daily organizer. Please select the best answer from the choices pro
    14·2 answers
  • Que es la papirofobia​
    13·2 answers
  • Which of the following HTML codes is correct for an ordered list?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!