1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
4 years ago
5

Which shortcut key aligns text to the center of the paige

Computers and Technology
1 answer:
borishaifa [10]4 years ago
6 0

Answer:

ctrl e then ctrl r

Explanation:

i used google cause im a. gooooddddddddd

You might be interested in
If a business owner wanted to create a banner ad for his business on his webpage, he could use Java programming to develop a (n)
hichkok12 [17]

The answer is applet

An applet is a fully functional Java application that is usually embedded within a HTML page and runs in a web browser. It has the entire Java API at its disposal and extends the java.applet.Applet class. Its class provides the standard interface between the applet itself and the environment of the browser.

8 0
4 years ago
Read 2 more answers
When a CPU executes each instruction in a program, it uses a process known as the __________.
lapo4ka [179]

Answer:

The answer is "fetch-decode-execute cycle"

Explanation:

The FDE cycle stands for Fetch-Decode-Execute cycle, It is a computing operation, in which a CPU process, to retrieves the system in its order memory form, it also decides that what instruction is supposed to do, and executes certain activities.  In this process, the operating system loads the files and the program on a disc to the main memory (RAM).

8 0
4 years ago
Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
pashok25 [27]

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

7 0
4 years ago
Which of the following gives the
satela [25.4K]

Answer:

a. Competitive advantage

7 0
3 years ago
Read 2 more answers
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
Other questions:
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use e
    12·1 answer
  • What is the purpose of a diode in a cordless drill or power screwdriver?
    14·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Consider a file currently consisting of 100 blocks. Assume that the file control block (and the index block, in the case of inde
    12·1 answer
  • W t f is a ground fault circuit interrupter?
    6·2 answers
  • Which 2 conditions must be met in order to use receipt forwarding in QuickBooks Online?
    11·1 answer
  • Fix the two words that are used incorrectly.
    10·2 answers
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
  • Here’s my last question
    12·2 answers
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!