1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
15

Write the steps of applying background colour to the document?​

Computers and Technology
2 answers:
zysi [14]3 years ago
8 0
Depends on the program
krok68 [10]3 years ago
7 0

Answer:

Select add color

Explanation:

depends the program u are using

You might be interested in
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence
Wewaii [24]

Answer:

both MAC and IPv4 addresses of the DHCP server

FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server

FF-FF-FF-FF-FF-FF and 255.255.255.255

MAC address of the DHCP server and 255.255.255.255

Explanation:

When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

3 0
3 years ago
Read 2 more answers
What new jobs were created as the automobiles displaced the horse
PolarNik [594]
Engineer...Mechanic,Tire creator etc
7 0
3 years ago
Brainly keeps deleting my questions and I don’t know why It says I violated the rules but I didn’t. pls help
labwork [276]

Well brainly could be deleting you question because of things like,

  • The question is for an exam
  • The question does not include proper question material
  • A singular swear word
  • Its not subject related to(math, science, history or etc).

<em>Hope this helps!</em>

3 0
2 years ago
A file has a name and an
3241004551 [841]

Answer:

extension

Explanation:

3 0
2 years ago
Other questions:
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct respo
    5·1 answer
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • Which statement pertaining to system reliability is FALSE? Select one: A. Having the latest version of software products can mak
    15·1 answer
  • What error can you identify? (Points : 4)
    12·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • ____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
    9·1 answer
  • 9. "मेरे तो गिरधर गोपाल, दूसरो ना कोई
    5·1 answer
  • What critical-thinking tool is being used when asking the question, "Is there a large enough scope of
    10·1 answer
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!