<span>Which is the primary use of a word processor?
</span>
create, edit, format, and print text-based documents
------------------------------------------------------------------------------------------------
Hope This Helps :)
P.S
If you could mark me as brainiest that would be great! :D
Answer:
It is either an internal IP address or it is a private IP address.
Explanation:
Read and write. Think of the term "literacy rate" it refers to how much of a population can read and write.
These principles are not explicit to one kind of program and are increasingly broad "best practice" rules that assist designers with composing code that is easier to maintain.
<u>Explanation:</u>
A set of programming guidelines that are executed to play out a particular undertaking according to the prerequisites of the client is known as programming. Every product has some essential standards to follow. In light of all product frameworks have basic quality traits, including accessibility, modifiability, execution, security and wellbeing, testability and ease of use, the key programming thoughts give basic arrangements or strategies to help those characteristics.
It is generally less expensive, over the long haul, to utilize programming designing strategies and methods for programming frameworks instead of simply compose the projects as though it was an individual programming venture.
Answer:
Rule based Attack.
Explanation:
As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.
This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.