1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
4 years ago
13

Angelina wants her text to look less crowded on the page, so she decides to decrease the length of the space the text occupies.

How can she change her page presentation to create this effect? She can go to the Layout tab and then to the Page Setup command group to decrease the margins of the page. She can go to the Layout tab and then to the Page Setup command group to increase the margins of the page. She can go to the Design tab and then to the Page Background command group to decrease the page borders. She can go to the Design tab and then to the Page Background command group to increase the page borders.
Computers and Technology
2 answers:
ratelena [41]4 years ago
8 0

Answer:

She can go to the Layout tab and then to the Page setup command group to increase the margins of the page.

Explanation:

Because margin decides from the text should start ie. it decides how much space should be left on the top of the page, bottom, left and right. If you increase the margin automatically the amount of space in all the four sides gets increased and hence the contents gets automatically adjusted and the text will look better readable than before.

The crowd that it has created before automatically gets adjusted and will give a better look.

Nadusha1986 [10]4 years ago
7 0

Answer:

b

Explanation:

e2020

You might be interested in
Match the example with the type of collection.
labwork [276]

Answer:

1.c

2.list

3.tuple

Explanation:

5 0
3 years ago
Which is the correct option?
Murljashka [212]

Answer:

C

Explanation:

Key logging is when a hacker can track every key u have clicked.

3 0
3 years ago
A programming and software development professional would most likely help with
DiKsa [7]
A programming and software development professional would most likely help with
Testing a software program.
3 0
3 years ago
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
4 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Other questions:
  • A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined
    10·1 answer
  • _____ is the network protocol that deals with the routing of packets through interconnected networks to the final destination.
    9·1 answer
  • According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g
    10·1 answer
  • What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical
    5·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • A major retailer wants to enhance their customer experience and reduce losses
    9·1 answer
  • Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
    6·1 answer
  • The internet is based on which three key technologies?.
    9·1 answer
  • Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false q
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!