1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
5

Choose the types of education and iss professional is most likely to have

Computers and Technology
1 answer:
shutvik [7]3 years ago
8 0

Answer:

A and D

Explanation:

Just took it on edgenuity

You might be interested in
The Backstage view is where you can see information and options pertaining to the user account and settings. How is the Backstag
Georgia [21]

Answer:b) Mail settings can be changed under the options menu

Explanation: I fr just guessed so y’all can have an answer and I ended up getting it rights

6 0
3 years ago
What type of software is developed by volunteers, contains code in the public domain, and helped to make Linux popular
valentina_108 [34]
Perhaps I’m being 5tup1d but I think your describing open source soft in general. Linux and a lot of periphery that runs on Linux is open source so it did play a large role being that it’s not proprietary like Windows and windows adjacent soft.
5 0
2 years ago
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
1 year ago
Minor changes to objects which only take effect at render time are called:
Ad libitum [116K]

Answer:

modifiers

Explanation:

The modifiers are the change that is minor with respect to the objects that have an impact at the render time

Therefore as per the given situation, the last option is correct as it fits to the current scenario

And, the rest of the options would be incorrect

The same is to be considered and relevant

Hence, the modifier is the correct option

7 0
3 years ago
Create a presentation on “Pets” and customize your presentation in the following ways:
DaniilM [7]

Answer:

I used Microsoft PowerPoint 2010 to create my presentation. I created five slides on the topic of “Pets” and then customized the presentation.

Theme: I selected the Hardcover theme from the Design tab.

Slide Master: The Slide Master consists of all the design elements that I want for my slides. Therefore, I used the Slide Master option from the View tab. It gave me a view of all my slides in the form of thumbnails (on the left side) as Master Layouts. From the thumbnails list, I clicked on the top-most one (larger thumbnail) to edit it. On this master slide, I changed the background design, color scheme, and positioning of the placeholders.

Animation: There were certain slides for which I wanted to add animations. I individually selected those slides and clicked on the Animations Tab. I selected the Zoom animation style for the entry and exit of my text for particular slides.

Slide Layout: Within my presentation, I wanted a slide (slide number 5) to stand out from the rest. This slide would talk about the various pet stores in the vicinity. First, I used the Insert Layout option while being on the Slide Master view. Next, I used the Insert Placeholder option and selected Picture. Then, I had to drag the cursor to create a placeholder on the slide. I right clicked the thumbnail of this new slide and selected Rename Layout to change the name of this custom layout to “Pet Stores.”

Explanation:

This is the answer for Plato

5 0
3 years ago
Other questions:
  • How do IT security workers help business
    5·1 answer
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • Find the range of the function for the domain<br>(-4,-2,0, 1.5,4).<br>f(x) = 5x²+ 4<br>​
    13·1 answer
  • What is the meaning of the phrase the video has gone viral
    9·2 answers
  • ...................You like swamps
    13·2 answers
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!