1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
10

In what two ways can you reset your workspace in photoshop adobe 2020?

Computers and Technology
1 answer:
kati45 [8]3 years ago
7 0

Answer:

right click 3 down press restart

Explanation:

You might be interested in
8.17 Lab: Strings of a Frequency Write a program that reads whitespace delimited strings (words) and an integer (freq). Then, th
WITCHER [35]

Answer:

def wordsOfFreqency(words, freq):

 text1 = "Apple apPLE mangO aPple orange Orange apple guava Mango mango"

 words = []

 words1 = []

 words1 = text1.split()

 words = [x.upper() for x in words1]

 freq=[words.count(w) for w in words]

 print(dict(zip(freq,words)))

 return words

def main():

wordsOfFreqency(words, freq)      

if __name__=="__main__":

main()    # call main function

Explanation:

This will print the list of strings as per its word frequency.

Output is :

{4: 'APPLE', 3: 'MANGO', 2: 'ORANGE', 1: 'GUAVA'}

4 0
3 years ago
The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.
almond37 [142]

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

7 0
3 years ago
Read 2 more answers
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp
dexar [7]

Answer:

c.

Explanation:

Based on the information provided within the question it can be said that the best option in this scenario would be to implement an endpoint management server appliance. This is a software or dedicated appliance that is used in order to discover, manage, and control any and all computer devices that are trying to access the corporate network. This allows you to remove individuals as well as administrative rights from those trying to connect or that are already connected.

5 0
4 years ago
Any three types of financial assistance that can be applied for after grade 12 to Study​
Romashka-Z-Leto [24]
Grants and scholarships
3 0
3 years ago
Which of the following is a best practice for a strong password policy?
belka [17]

Answer:

Passwords must meet basic complexity requirements.

Explanation:

Password should contain:

  • Uppercase letters
  • Lowercase letters
  • digits (0 through 9)
  • special characters like @#$%^&*
  • minimum length of 8

Passwords should not contain:

  • user's name or surname
  • birth year/date
  • not similar to previous password
  • account/identity number
7 0
3 years ago
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • Which best describes a VPN?
    14·2 answers
  • Write a Java program that calculates and prints the monthly pay check for an employee. The net pay is calculated after taking th
    8·1 answer
  • The amount of money you can charge to a credit card is called?
    5·2 answers
  • In programming, what is a string?
    8·2 answers
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • What do u think a creative app must have? <br><br> Please answer the question ASAP!!
    5·1 answer
  • The number of binary digits required to count 10010 is called _________​
    10·1 answer
  • What do you think is the most important part of the history of internet what event has had the biggest impact on your daily life
    7·2 answers
  • which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!