1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
14

If someone wouldn’t mind answering the first question for me

Computers and Technology
1 answer:
kompoz [17]3 years ago
8 0

1.

  • Keep the title bold
  • <u>Underline</u> important statements
  • Colour the words (but the document shouldn't be too colourful)
You might be interested in
This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identi
allsm [11]

Answer: d

Explanation: hope this helps

6 0
3 years ago
Read 2 more answers
Which is the best web development company in Pakistan?
andriy [413]

Answer:

Arbisoft is listed as the top cpmpany.

Explanation:

The top 5 are:

Arbisoft

Cygnis Media

Tintash

Square63

OneByte

4 0
2 years ago
Please help!
34kurt

Answer:

I don't know the exact fix to this because I don't know exactly what you're talking about, but I do suggest you instead just highlight with shift and the arrow keys to make it much simpler.

7 0
2 years ago
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Other questions:
  • How do computers perform complicated tasks built from simple instructions?
    14·1 answer
  • An important safety precaution you should take before starting any electrical servicing job is to make sure that your
    15·2 answers
  • Ansel Adams education and special training
    14·1 answer
  • Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(n/4) + 4n +
    10·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • Which file extension takes less storage space?
    13·2 answers
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • Can some one help me i do not now how to give a BRANLEST. if you help i will give you one BRANLEST.
    7·2 answers
  • Detecta 1 problema
    5·2 answers
  • What is control structure write it's types​ .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!