Answer:
pomposity
Explanation:
Pomposity is a form of social media red flag that centers on individuals or users employing flamboyant captions, words, or catchy phrases to describe something or someone in a way that appears more significant than the reality.
In this case, given that the email is from an "email from an impressive-sounding stranger" means Professor Alexander is using flamboyant words to persuade me to vote for his presidential candidate in a way that is more substantial than the reality.
Hence, in this case, the right answer is POMPOSITY
The answer is 2-to-the-power-of-n, since for every input, the number of different combinations doubles. From your list I think answer A is meant to indicate 2ⁿ.
Answer:
False
Explanation:
Slide view is the view seen when PowerPoint is started but it's not the only view in powerpoint that allows users to see multiply slides.
Other view that allows such are
1. Print preview.
2. Outline view
3. Slide Sorter view
4. Note page view
1.
In PowerPoint click the print button and go to print preview screen.
Go to layout and select the number of pages per sheet etc..
The number of pages selected is the number of slides that will be displayed.
2.
Outline view displays slides in outline form.
3.
The Note Page view displays a mini version of slides in the area below for speaker notes.
Each of the multiple slide are displayed on individual own notes page
4.
Slide Sorter view displays a miniature version of all PowerPoint slides in horizontal.
1.software used to manage databases
Answer:
The risk and threat that need immediate mitigation are:
- random access to your personal computer without your permission
- deletion of files and data
- hacking of IT infrastructure
- uploading of file s on the social platform
- classified data can be used to blackmailing
Explanation:
Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.
The risk and threat that need immediate mitigation are:
- random access to your personal computer without your permission
- deletion of files and data
- hacking of IT infrastructure
- uploading of file s on the social platform
- classified data can be used to blackmailing