1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
4 years ago
13

You can rotate a selected graphic by dragging a ________ rotation handle

Computers and Technology
1 answer:
kotykmax [81]4 years ago
7 0

I guess the correct answer to the blank is round.

You can rotate a selected graphic by dragging a round rotation handle.

You might be interested in
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
Elza [17]

Answer: C) Man-in-the-middle

Explanation: Man-in-the-middle attack is the attack where the hacker or attacker receives and passes on communication by manipulating it between victim and entity. These two parties have the middle-man who can alter the communication secretly , without the knowledge of other parties.

The situation mentioned in the question is also similar where the   every certificate on network seems to be signed ,which was not communicated or done by the proxy server or network administrator actually.

Other options are incorrect because transitive access is misusing the access and control leading to information risk. Spoofing is disguising of hacker into reliable device for hacking information. Replay is the playing the content again in repetition.Thus , the correct option is option(C).  

 

7 0
3 years ago
Informatyka klasa 7 daje naj
Kay [80]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
In a proper webpage which tag holds all of a webpages visible HTML?
tiny-mole [99]
<h3>Answer:</h3>

The body tag.  (<body></body>)

<h3>Explanation:</h3>

A very basic webpage may be formatted like this:

<html>

<head>

<title>Hello, World!</title>

</head>

<body>

<h1>Hello, World!</h1>

</body>

</html>

In this case, the body tag holds an h1 tag, which is visible to the user.

4 0
3 years ago
Read 2 more answers
A tripod head can move vertically or horizontally. What term describes these movements?
AnnyKZ [126]

The term for vertical movement of a tripod is Tilt. The term for horizontal movement is Pan.

Vertical movement of the camera angle involves pointing the camera up and down. This sort of movement is achieved so as to follow a subject or show the top and bottom of a still object. With Tilt, you can show how tall objects are. On the other hand, the tripod’s horizontal movement is used for a smooth effect. Like Tilting, it shows a subject or show the distance from left to right between two objects. Pan shots are great for panoramic views .

7 0
4 years ago
Read 2 more answers
Does anyone have a pdf of the greatest by eddie van der meer????
gregori [183]

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

3 0
3 years ago
Other questions:
  • Exchanging which type of data uses the least bandwidth?
    14·1 answer
  • How can I get more Gems in the game {Fashion Empire} through a Fire kindle?
    15·2 answers
  • What is the difference between a fiber optic cable and a twisted pair cable?
    5·1 answer
  • What is the focus of developers interested in the Internet of things?
    11·2 answers
  • How can we lock pubg game from Play Store???​
    12·2 answers
  • A program is a high-level one that has been converted to machine language
    15·1 answer
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.
    9·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • (50 POINTS!) Type the correct answer in the box.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!