1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
9

If I wanted to repeat an action such as a heading for a paper, it would be helpful to _____. create a citation create a caption

create a macro copy and paste
Computers and Technology
2 answers:
ratelena [41]3 years ago
8 0

Answer:

(A)-Copy and paste

Explanation:

salantis [7]3 years ago
7 0
Um... Copy and paste
You might be interested in
What is the most common way to perform searches in a search engine?
valina [46]
Using key words is the best way to search things in the search engine. make sure everything is spelled correctly.
5 0
3 years ago
A system developer needs to provide machine-to-machine interface between an application and a database server in the production
nordsb [41]

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.

7 0
3 years ago
What is cyber safety?
mario62 [17]

Answer: Cyber safety is a process that protects computers and networks. The cyber world is a dangerous place without security and protection.

Explanation: Hope this helps!

7 0
3 years ago
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
Can we change the format of a field (e.g. Number to Dollars).
mixer [17]

I think the answer is

3 - Usually, but we may need to convert the data types (date to text)

Because we can change the format, but depends of the original format type and in what type you need to format.

I think this can help.

3 0
3 years ago
Other questions:
  • Typing a ____________ at the beginning of a word will exclude that word when doing a search.
    8·2 answers
  • Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?
    11·1 answer
  • _____ rows indicate that there is different formatting for odd and even rows.
    14·1 answer
  • Complete the sentence.
    14·1 answer
  • A mail merge data source must contain
    15·1 answer
  • HELLO!!!! For instance, will we get an error if we put a space after the word “print” and before the opening parenthesis in pyth
    9·1 answer
  • The term technology is derived from the Chinese word. it is true or false​
    9·2 answers
  • In GD, what does RWR stands for?
    9·1 answer
  • Una laptop agarra mas internet que una computadora de escritorio?
    11·1 answer
  • Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!