Answer:
belongs to everyone.
Explanation:
A National Archive can be defined as the collection of data (informations) and documents by the government of a particular country for record keeping purposes.
Basically, these documents comprises of information about important and historical events that have happened in the country or events generally related with the country.
Hence, the National Archives is part of the federal government, which means that its content belongs to everyone. This is simply because the federal government is a government of the people, for the people and by the people. Thus, the ownership of governmental institutions or agencies belongs to the general public i.e the citizens of the country.
A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.
Answer:b)With a wavy blue underline
Explanation:Wavy blue lines in the Word document is for representing that the Format consistency checker is in working/on mode .It can identify the inconsistent format instances for the correction while the user is writing the text.
Other options are incorrect because wavy red line is for incorrect spelling of any word and wavy green line signifies the grammatical mistake .The function is available for the format inconsistency as wavy blue line in Word .Thus, the correct option is option(b).
Answer:
Bootrec.exe
Explanation:
The process of turning on a computer system is called booting. When a computer system boots, it runs the post test and loads into memory, the information or program needed to run the operating system, and then locates the operating system from the boot manager record in the disk partitions. When the disk is failed to be recorded, or the boot manager or sector is corrupt or lost, the bootrec.exe command is used in the command prompt to correct these problems.
Answer: Switch
Explanation: ARP spoofing is a illegal harmful activity in a disguised manner by a person who tries to send the ARP (Address resolution protocol)request.The disguised ARP request is sent to steal the confidential data by the overloading of the switch because of the numerous amount of the ARP request. This attack is done in the local area network .Therefore, the correct option is switch.