1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
7

Which conditional tab would you use to add a quick style to a form or report? Arrange Design Format Page Setup

Computers and Technology
1 answer:
Vilka [71]3 years ago
5 0

Answer:Format

Explanation:

You might be interested in
What type of trust model is used as the basis for most digital certificates used on the internet?
vesna_86 [32]

The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

<h3>What is the trust model of the Internet?</h3>

The trust model of the internet is known to be one that is made up of tradeoffs.

Note that Distributed trust is seen as the system that is made up of transactions and it is one that is backed up by an extended community and onw where there is no trusted third parties.

Hence, The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

See full question below

What type of trust model is used as the basis for most digital certificates used on the Internet?

A. third-party trust

B. distributed trust

C. related trust

D. managed trust

Learn more about digital certificates from

brainly.com/question/24931496

#SPJ1

3 0
2 years ago
Complete each of the following sentences by
Minchanka [31]

Answer:

something like

Explanation:

Audio digitization converts analogue

sound a sound wave

Digital audio is stored in binary

The process of audio digitization converts the

sound wave into a series of numbers.

5 0
2 years ago
Read 2 more answers
JAVA Code:
Burka [1]
Dear ,you should ask it on stackoverflow and geekforgeelks , not here
6 0
4 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
Explain what a wiki is and list its advantages.
Drupady [299]

Explanation:

Wikis are defined as a form of a website or web page or a database where the users can work on the data, they can even add or edit the data. Wikis use a very quick as well as a easy syntax that allows the users to format the text and create various links between the pages. The users need internet browsers for that.

One of the main advantage of wiki is that it provides ability to collaborate asynchronously, and also without  time constraints.Besides it also provides a beneficial function of something. It is free and not expensive.

5 0
3 years ago
Other questions:
  • What are the major features of a successful ethics training program and communication systems? Think of an example of a company
    13·1 answer
  • You have begun a new project and want to keep all of the work you're doing on the project in its own directory. You will create
    8·2 answers
  • By default, windows does not display ____________________ in windows explorer.
    8·1 answer
  • Way to minimize technical problems with your computer
    6·1 answer
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
    15·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
  • What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr
    5·1 answer
  • In what ways can information be slanted in a news report? List at least five ways.
    5·2 answers
  • Write a function named days() that determines the number of days since January 1, 1900 for any data passed as a structure. Use t
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!