1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
11

Which of the following is not a standard view in Microsoft PowerPoint?

Computers and Technology
1 answer:
Luda [366]3 years ago
6 0
I think the answer would be D. Sorry if i'm wrong but i'm pretty sure it is D.
You might be interested in
Explain why the receptionist responded as indicated in the following scenario.
slavikrds [6]
The receptionist is aware of the every day attire as he works there. Jim and Roger are undressed, since they were wearing blue jeans. The receptionist lets them know of what’s expected.

Hope this helps!
4 0
2 years ago
Seeing an error message on the screen after you click on a link or icon may indicate that your PC doesn't have the correct _____
Bad White [126]
A accessory because it will not open if it wont be compatible
3 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
In a Windows environment, __________ is a powerful tool that enables security administrators to share user and group definitions
spayn [35]

Answer:

Active Directory

Explanation:

Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.

Active Directory categorizes objects by name and attributes. For example, the name of a user might include the name string, along with information associated with the user, such as passwords and Secure Shell (SSH) keys.

7 0
3 years ago
A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo
anzhelika [568]

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

7 0
3 years ago
Other questions:
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • If after a run of arc consistency during the backtracking search we end up with the filtered domains of *all* of the not yet ass
    12·1 answer
  • What term is used to refer to the way companies collect and process data in order to create new information to make important bu
    13·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • What is the term used when a password is obtained through tricking a user into giving it to another party?
    15·1 answer
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • A connection between files that allows data to be transferred from one file to another is a _______________________.
    6·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!