1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
5

Use the ________ property in the html link tag to to associate a web page with a style sheet for printing.

Computers and Technology
1 answer:
lawyer [7]3 years ago
8 0
You should use the <span>media="print" link tag to achieve this. </span>
You might be interested in
Why are abbreviations like BRB, TBH, and IDK appropriate in some situations but not in others?
Y_Kistochka [10]

Dont talk in abbreviations to elders, most of them might not know what that means and youll likely have to teach them

7 0
3 years ago
Read 2 more answers
Helppp meeeeeeeeeeeeeee
Maru [420]

Answer:

A

Explanation:

this is the god i think they worship

4 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Your company has decided to store data files in Cloud Storage. The data would be hosted in a regional bucket to start with. You
Natasha_Volkova [10]

1. Necessary backup from cloud storage to client workstation or desktop or pc.

2. Delete 30 day and one year data from cloud storage.

<u>Explanation:</u>

Purging the data is used in database where necessary backup and purging the data up to certain years. So that database is access will be faster.

At cloud storage it has very limited storage's and by increasing storage will cost more to company or organization, as best practices every 30 day the purge old data should done in cloud storage's and with necessary backup  to be taken as precautionary measurement.

Once data is completed more than one year, with necessary backup delete old year data from cloud storages. Some cases old dead account where been deactivated also can deleted depends of organizations policy.

7 0
3 years ago
¿El auto es un servicio tecnológico? / The car is a technological service?
EleoNora [17]
A car isn’t technological, It runs on gas. Hopes this helps :p
4 0
3 years ago
Other questions:
  • Lorann sends messages to Aiden that always go into Aiden's Junk E-mail folder. Which process would best correct this problem so
    5·1 answer
  • Why was the internet originally constructed
    5·1 answer
  • a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whol
    10·1 answer
  • The Sussex Educational Processor executes an instruction every 3 clock cycles. Explain why that is the case and specifically wha
    12·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
    6·1 answer
  • Crystal inc. is a multifaceted company that deals with the mining, cutting, and selling of diamonds. It gives distributors and s
    10·1 answer
  • Create a parent class called Shape with width and height parameters of type double and a function that returns the area of the s
    12·1 answer
  • The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
    8·1 answer
  • Which of the following can you use to judge source legitimacy?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!