1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
13

Match the following

Computers and Technology
1 answer:
kakasveta [241]3 years ago
8 0

Answer:

Eraser tool -removes the unwanted part of the drawing.

Row -horizontal space running from left to right.

Text -Primary component of a multimedia.

Drawing Area -Working are of ms point program.

I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?

You might be interested in
Gabe just won the lottery after ten years of consistently buying a ticket every Friday. Based on his initial reaction of feeling
ludmilkaskok [199]
The answer is D. cortisol level would most likely decrease.                                                                                                                                                                             

5 0
4 years ago
Read 2 more answers
Which code results in a ValueError?<br><br> int('seven')<br> float(2.5)<br> int(7)<br> 8 / 0
SOVA2 [1]

Answer:

Int(‘seven’)

Explanation:

Took one edg

6 0
3 years ago
Read 2 more answers
What does setTempo() allow you to do in EarSketch?
vlada-n [284]
Specify the tempo of a song
4 0
2 years ago
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
3 years ago
Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or
lawyer [7]

Answer:

Yes, I do agree with the given statement. A further explanation is provided below.

Explanation:

  • Web design but mostly application development were most widely included throughout an interchangeable basis, though web design seems to be officially a component of the wider website marketing classification.
  • Around to get the appropriate appearance, several applications, as well as technologies or techniques, are being utilized.

Thus the above is the right approach.

6 0
3 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • Mention five features of word processing application​
    10·1 answer
  • Exchange is defined as the trade of goods between two nations. This phenomena is also known as ___________.
    9·1 answer
  • Which of the following is not hardware? Question 7 options: A) Wireless network router B) Printer C) Virus Scanner D) Flat-panel
    11·1 answer
  • Identify the use of queue in the process of spooling output to a printer.
    15·1 answer
  • Note: the println() function prints out a line of text with the value that you pass to it - so if you say println("Hi"), it will
    5·1 answer
  • The federal government is the largest employer of cybersecurity professionals true or false
    5·1 answer
  • How to reload ingenuity when a pulsating blue thing is there
    11·1 answer
  • Big data are used to _____. Select 3 options.
    5·1 answer
  • Which technology keeps track of heart rate during a workout? (3 points) bathroom scale calculator pedometer wrist monitor
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!