1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
6

If you have created a document that contains a table that is 10 inches wide and 4 inches high, you will want to print the docume

nt in Landscape orientation. True/False
Computers and Technology
2 answers:
Papessa [141]3 years ago
6 0
True you will want to print the document in Landscape orientation
Vera_Pavlovna [14]3 years ago
3 0
True
Hope this helps you with your answer
You might be interested in
Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
koban [17]

Answer:

ISO 27002

Explanation:

The acronym ISO stand for The International Organization for Standardization. its a non governmental body that is responsible for setting standards guide internationally.

while NIST stand for National Institute of Standards and technology and it is also a body that is responsible for setting up standard guide in the US..

ISO 27002  is a standard code for implementing information security management systems. while  ISO 27017 is for cloud security.  NIST 800-12 is a general security and NIST 800-14 is for policy development. thus option A is correct.

Note :

All code preceded by ISO is from The International Organization for Standardization and are international standard. while those preceded by NIST is from National Institute of Standards and technology  and are not international standard.

7 0
3 years ago
Qué propiedades del bromato de potasio han hecho que sea el aditivo más usado en la fabricación del pan​
torisob [31]

Answer:

es la capacidad de unir proteínas presentes en la harina

4 0
3 years ago
NTDS Quotas store NT Directory Service quota information that limits the number of Active Directory objects a user, group, compu
Anna35 [415]

Answer:

The anwer is advanced feature folder

Explanation:

Because NTDS QUOTAS is an advanced feature folder that stores NTDS quota information that limits the number of Active Directory objects a user, group, computer, or service can create.

3 0
3 years ago
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
Other questions:
  • It is not recommended by the USA EPA, but adding refrigerant to a leaking A/C system is
    13·1 answer
  • Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security
    13·2 answers
  • A(n) _________________________ is a character that word displays on the screen but is not visible on a printed document.
    13·1 answer
  • The graph of which function has an axis of symmetry at x=-1/4​
    15·1 answer
  • Can you clone apps form your PC and to other PC?<br>Yes or No
    13·2 answers
  • How to get out of compatibility mode in word?
    15·1 answer
  • The parallax perspective says that objects that are close up appear to move __________ than far away objects.
    10·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • What does Al stand for?
    10·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!