Answer:
Click the Page Layout tab and then the Margins button.
Choice D is correct
Explanation:
In order to change the top and bottom margins of an entire document, simply
Click the Page Layout tab and then the Margins button.
I hope this helps..
Great Day ahead
Ping and traceroute locally and on a remote server. Locally it will tell if you local setup is correct and to test your network communication it needs to travel over a network.
Answer:
Process re-design is the process in which re-work is done to achieve the improvement in the output. The major aim is to set the goals for achieving the main objective.
The various essential steps in the process of re-design are:
- Data capturing process are used to identify the process and making the necessary changes.
- Identify every step of the process to ensure that process is in organized way along with the workflow.
Re-engineering is the process of re-design the system with focuses to improve the efficiency and quality. It basically analysis the whole business re-engineering process. The main step is to identify the need for the changes.
Answer:
A
Explanation:
The value will be the original stored in the int variables. This is because the method swap(int xp, int yp) accepts xp and yp parameters by value (They are passed by value and not by reference). Consider the implementation below:
public class Agbas {
public static void main(String[] args) {
int xp = 2;
int yp = xp;
swap(xp,yp); //will swap and print the same values
System.out.println(xp+", "+yp); // prints the original in values 2,2
int xp = 2;
int yp = 5;
swap(xp,yp); // will swap and print 5,2
System.out.println(xp+", "+yp); // prints the original in values 2,5
}
public static void swap(int xp, int yp){
int temp = xp;
xp = yp;
yp = temp;
System.out.println(xp+", "+yp);
}
}
Answer:
packet filtering
Explanation:
We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D