Answer:
Folded card This layout type is for creating greeting cards by printing pages on a sheet and then folding the sheet to make the card. If you choose the Folded card layout, then sheet fold options are displayed. Select an option in the list to specify how you will fold your publication
Explanation:
Relating to, using, or expressed in a system of numerical notation that has 2 rather than 10 as a base.
Answer:
There are two error in this program--
- In header file inclusion, file is not defined.
- In the statement "result = ++(num1 + num2);" , bracket is fixed after the increment operator.
Explanation:
- For the first error, the user needs to add the file because "#include" is used to add the library for the program which states about the function and symbols used in the program.
- The second error is because there must be a variable with the increment operator ( increment operator is being used to increase the value of a variable by 1), but there is a small brace fix in between the operator and operands.
One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.
<h3>What is a cloud?</h3>
In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.
In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.
Read more on a virtual machine here: brainly.com/question/12060797
#SPJ1
Complete Question:
Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?
A. Enable virtual machine API integration.
B. Rotate the cloud access keys.
C. Deploy an OSI layer 7 firewall.
D. Enable cloud resource activity auditing.
A
Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.
RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task.