Answer:
I'm not sure i haven't had that problem
Explanation:
Short Answer C
The Primary use of any word processor is to create word documents (like this editor) with the ability to format it with bold letters or <u>underlining</u> or <em>italics</em>. There are many other choices of things to do. All your choices are true but the main one is the third one down.
It can do very simple mathematical calculations if it can create tables (neither of which is possible with this editor. A is incorrect.
D is mostly incorrect. Very few word processors have built in capabilities that would help you with word games. There are some that do. Most don't.
I would hate to create fonts using a word processor. It's remotely possible, but anyone in his right mind would try using a program designed for that.. B is incorrect.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
There are some steps that you use to access the subtotal dialog box.
To access the Subtotal dialog box, you need to follow the following steps:
Click the Date tab
In the Outline group, click Subtotal
to access the Subtotal dialog box.
The Subtotal function used in Excel and return the subtotal of the numbers in a column in a list or database. Subtotal is a builtin function in Excel that used to subtotal the number in a column or in a given database.
Answer:
a. True
Explanation:
The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.
A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.
The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.
Answer
Peer-to-peer network
Explanation
Social media video sharing networks a platform which is an entertainment based where members can share videos in a site. it allows easy integration with other social networking platforms to share and watch videos. To start a social media video sharing network, Rebecca is required to set up a Peer-Peer Network.
Peer-Peer network is created when two or more computers are connected and they are sharing resources without going through separate servers. That is a couple of computers are connected via a Universal Serial Bus to transfer files.