Answer:
Word art is used to modifying the shape of the text and the text features in micro-soft word such as colors, style and effects. In word art you can also used to create different styling and text features within your microsoft application and documents. It is also useful in flourishes your text.
Answer: WordPress
Explanation:It is a kind of website where you can publish your content on any thing and can also buy domain there,if wanted
Answer:
________________________
The following is a list of "6 (six) errors" :
__________________________________
1) The "city, state, and zip code" should be listed on a separate line, directly following the street address:
_______________________________________________________
→ Hartford, CT 06114
_______________________________________________________
2) In "Objective" section: The misspelled: "challenging" should be changed to "challenging".
_______________________________________________________
3) In the "Objective" section: The word: "righting" should be changed to:
"writing".
_______________________________________________________
4) In the "Summary" section: The misspelled: "addjust" should be changed to: "adjust" .
________________________________________________________
5) The misspelled "impppeccable" should be changed to "impeccable".
________________________________________________________
6) Perhaps, "drive-thru" should be changed to: "drive-through" ; but even more importantly— refer to:
________________________________________________________
"Managed all staff and ensured hi performance and efficiency" ;
→ The "hi" should be changed to "high".
___________________________________________________
These are some errors. Glad to be of help!
___________________________________________________
Answer:
MAN IN THE MIDDLE
Explanation:
Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.
A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.