Explanation:
<em>Formatting</em><em> </em><em>with</em><em> </em><em>Word</em><em> </em><em>Art</em><em> </em>
<em>Standard</em><em> </em><em>formatting</em><em> </em><em>options</em><em>,</em><em> </em><em>such</em><em> </em><em>as</em><em> </em><em>bold</em><em>,</em><em> </em><em>italic</em><em>,</em><em> </em><em>and</em><em> </em><em>underline</em><em> </em><em>,</em><em> </em><em>are</em><em> </em><em>all</em><em> </em><em>Available</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>home tab</em><em>.</em><em> </em>
<em>Word</em><em> </em><em>Art</em><em> </em><em>Styles</em><em> </em>
<em>You</em><em> </em><em>can</em><em> </em><em>find</em><em> </em><em>Word</em><em> </em><em>art</em><em> </em><em>text</em><em> </em><em>effects</em><em> </em><em>in</em><em> </em><em>the</em><em> </em><em>text</em><em> </em><em>group</em><em> </em><em>on</em><em> </em><em>the</em><em> </em><em>insert</em><em> </em><em>tab</em><em>.</em><em> </em><em>When</em><em> </em><em>you</em><em> </em><em>apply</em><em> </em><em>a</em><em> </em><em>word</em><em> </em><em>art</em><em> </em><em>text</em><em> </em><em>effect</em><em> </em><em> </em><em>,</em><em> </em><em>PowerPoint</em><em> </em><em> </em><em>2</em><em>0</em><em>0</em><em>7</em><em> </em><em>displays</em><em> </em><em>the</em><em> </em><em>format</em><em> </em><em>contextual</em><em> </em><em>tab</em><em> </em><em>under</em><em> </em><em>drawing</em><em> </em><em>tools</em><em>.</em><em> </em>
Two of the three tables in his database should have foreign keys that link to primary keys in one of the other tables. That way he can join the tables together.
Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.
About the other answers:
A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.
C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.
D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).
Obstacles to becoming digital literates and solutions include:
1. Poor network connectivity. Solutions are:
- Use good network service providers.
- Find a good location with good internet facilities.
2. Authenticating Information. Solutions are:
- Ensure you do a thorough research before sharing any information on the internet.
- Learn to be critical with information.
3. Excessive Use of the Internet. Solutions are:
- Always have a target of what you want to achieve with the internet.
- Avoid unproductive activities.
<h3>What is Digital Literacy?</h3>
Digital literacy can be defined as the ability or skills needed to be able to access information and communicate via internet platforms, mobile devices, or social media.
<h3>Obstacles to becoming Digital Literates</h3>
1. <u>Poor Network Connectivity</u>: In areas where network connectivity is poor, digital literacy becomes difficult to achieve as accessing the internet to source information would be impeded. The solutions to this are:
- Use good network service providers.
- Find a good location with good internet facilities.
2. <u>Authenticating Information:</u> The internet is awash with information, most of which may not be verifiable, when a user becomes misinformed, they tend to have biases which affects their critical thinking. Solutions to this are:
- Ensure you do a thorough research before sharing any information on the internet.
- Learn to be critical with information.
3. <u>Excessive Use of the Internet:</u> People tend to spend much time on the internet which at the end of the day becomes unproductive. Solutions to this include:
- Always have a target of what you want to achieve with the internet.
- Avoid unproductive activities.
Learn more about digital literacy on:
brainly.com/question/14242512
//docommentifanyproblemarises //code classMain{ publicstaticvoidmain(String[]args){ /* * *leavethismain would be some of the code. i hope this helps.