1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
13

If I wanted to include a picture of a dog in my document, I could use

Computers and Technology
2 answers:
11Alexandr11 [23.1K]3 years ago
8 0

Answer:

Online Pictures

Explanation:

salantis [7]3 years ago
3 0

Answer:

Online Pictures

Explanation:

It's not Auto Correct obviously, Word art is with text, and Smart art is formatting or the way it looks

You might be interested in
Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software
kiruha [24]

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

  • HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another.
  • The Web browser is also a wrong choice because it is used to display the design of the web page.
  • Operating software is also a wrong choice because it system software in which all things are done.  
3 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner repre
NikAS [45]

Answer:

Explanation:

The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly{

   public static void main(String[] args) throws FileNotFoundException {

       Scanner console = new Scanner(System.in);

       System.out.print("file location: ");

       String inputLocation = console.next();

       File inputFile = new File(inputLocation);

       Scanner in = new Scanner(inputFile);

       lowestPrice(in);

   }

   public static void lowestPrice(Scanner in) {

       double smallest = in.nextDouble();

       while(in.hasNextDouble()){

           double number = in.nextDouble();

           if (number < smallest) {

               smallest = number;

           }

       }

       System.out.println(smallest);

       in.close();

   }

}

6 0
3 years ago
Which option is used in order to configure switchboards for a complex database?
Ostrovityanka [42]

Answer:

switch board manager

Explanation:

8 0
3 years ago
Read 2 more answers
Which file types have .exe and .omg as their extensions?
Tatiana [17]
I know that Windows computer files use the extension exe.

3 0
3 years ago
Other questions:
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • In object oriented programming, what is another name for the "attributes" of an object?
    14·1 answer
  • Which magazie can help the public determine the best technology to use
    10·1 answer
  • Which of the following is NOT a factor that increases the health risks of construction workers?
    9·2 answers
  • One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be
    13·1 answer
  • Beth wants to add information to her powerpoint presentation that is hiden from her audience and only she will see. Which featur
    5·1 answer
  • An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
    13·1 answer
  • Select the correct answer.
    13·1 answer
  • Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
    14·1 answer
  • What are the two main types of citing information?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!