1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
12

I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
3 0

Answer:

Use font colors that work well with your background.

Select font sizes that are appropriate for your delivery method.

Fonts should be appropriate for your audience.

Limit the number of fonts you use to three or four.

Hope this helps!

You might be interested in
What does different screen size have to do with the display apperance of sites?
lesantik [10]
Display quality, or fit
7 0
3 years ago
The function keys are labeled from f1 to wat
Fed [463]
If we are talking about a simple North American Keyboard, The answer would be F1 to F12
Hope this Helps!!!
8 0
3 years ago
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She i
Yakvenalex [24]

C. Change management

Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems by following the Change management process.

What exactly is change management?

Change management is the process of developing and implementing effective change strategies in businesses and organizations.

Examining the reasons for change, implementing changes, and assisting people in adapting to these changes are all part of it. This could include reorganizing the workforce, implementing new technology, lowering costs, increasing profits, or a combination of these to achieve a specific goal.

To know more about Change management, visit: brainly.com/question/28096717

#SPJ4

4 0
1 year ago
Question 24 Multiple Choice Worth 5 points)
Veseljchak [2.6K]

Answer:

ZIP

Explanation:

ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections

TBH:

it may be O ZIP but i've never heard of it.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • Make sure to read all of these specifications carefully. Write a function, named array_shifter, that accepts an array of doubles
    12·1 answer
  • What are some good editing software apps for pc?
    11·1 answer
  • What is another name for “low-angle lighting”?
    7·1 answer
  • Which of the following instructions should be allowed only in kernel mode? (a) Disable all interrupts. (b) Read the time-of-day
    11·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this c
    9·1 answer
  • What is computer assisted translation​
    9·1 answer
  • KELLY Connect
    8·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!