Answer: USE GOOGLE CHARTS
Explanation:
Answer:
<h2><u>Fill in the blanks</u></h2><h2><u>Question 1</u> </h2>
Patterns are <u>repeated</u> shapes, colors, tones or objects.
<h2><u>Question 2 </u></h2>
What are two things you can do to strengthen a pattern image?
-Add in a person or frame it in a different way
-Look at it from different angles and frame it in different ways
<h2><u>Question 3</u></h2>
Patterns can be <u>man - made</u> and they can be found in nature.
<h2><u>Question 4 </u></h2>
When you are looking for man made patterns in a town or city, don't forget to look i<u>n front of you</u>
<h2><u>Question 5</u></h2>
What is one technique you can use to show scale and perspective in your photo?
- <u>add color </u>
Answer:
O Make sure there is a tab between each item.
Explanation:
We need to make sure that there is a tab in between each item. If we place the tab properly, we can indent. We require first level indentation, we need to insert one tab, and more tabs depend upon the number of indentation level we want. For the second level indentation we need the two tabs, and so on. Nothing else is required certainly, and once we place the tabs correctly then we can apply the bullets and numbering to the tabbed list.
Answer: ensuring that a system is not changed by a subject that is not authorized to do so
Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion
Answer:
1024
Explanation:
The maximum number of nodes for segment in Ethernet is 1024.
<em>-kiniwih426</em>