1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
6

What the best option if you cant show your PowerPoint presentation at all

Computers and Technology
2 answers:
emmasim [6.3K]3 years ago
3 0

Use Google Slides. It works a lot better.

Gnoma [55]3 years ago
3 0

Answer:

create PDF/XPS document

Explanation:

You might be interested in
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
4 years ago
Write a program that will allow a grocery store to keep track of the total number of bottles collected for a seven-day period. T
Anna35 [415]

Answer:

  • Print the values days of bottles.
  • Display total number of bottles collecting.
  • Display the payout for this transaction.

Explanation:

Program:-

DEPOSIT_PER_BOTTLE = 0.10

another = "Y"

while another=="Y":

   print("Input Values 7 days of bottles:")

   total = 0

   for I in range(7):

       collected_bottles = int(input())

       total += collected_bottles

   payout = total*DEPOSIT_PER_BOTTLE

   print("Total number of bottles collected: {:,}".format(total))

   print("Payout for this transaction $%.2f"%payout)

   another = input("Do you want to complete another transaction? ").upper()

7 0
3 years ago
if you exit a program without saving the document on which you are working, or the computer accidentally losses electrical power
MrRissso [65]
Depends on which program you are using. Some programs automatically save your work, even if you exit out of it or turn off your computer
6 0
3 years ago
Douglas Engelbart is credited with the invention of _____
kicyunya [14]
He created computer mouse
6 0
4 years ago
Other questions:
  • Without exception, you must always stop when ______________.
    14·1 answer
  • Is a storyboard an example of an implemation tool?
    12·2 answers
  • In this exercise, you are given a word or phrase and you need to return that word or phrase with the word ‘like’ in front of it.
    5·1 answer
  • Which type of exception would be detected if you used the conversion command Convert.ToDecimal to try to convert an ampersand?
    14·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
    10·1 answer
  • Please an urgent answer<br>will give brainliest<br>what is the definition of bucket address.​
    13·1 answer
  • Write a recursive function num_eights that takes a positive integer pos and returns the number of times the digit 8 appears in p
    8·1 answer
  • A trackerball is a pointing device
    9·1 answer
  • Select the skill that matches the following definition.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!