1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
8

Which are print settings that can be modified in word 2019 choose two answers​

Computers and Technology
1 answer:
kvasek [131]3 years ago
5 0

Answer:

word can change your writing sliks

Explanation:

You might be interested in
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
How are network computers different from traditional personal computers? describe some usage scenarios in which it is advantageo
Elanso [62]
A network computer depend on on a centralized computer for most of its services. It can consequently have a minimal operating system while a personal computer on the other hand has to be proficient of on condition that all of the required functionality in a detached manner without depending on a centralized manner. Scenarios where administrative costs are high and where sharing leads to more efficient use of resources are exactly those settings where network computers are preferred.
8 0
3 years ago
Which kind of a person will you be if you prove to be accountable for your actions?
Black_prince [1.1K]

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

3 0
3 years ago
If you enter 234.567 into a cell that is formatted to display 1 decimal point place, what is the value stored in the cell
zalisa [80]

IT WILL NOT BE 234.6 FOR PF GANG JUST TOOK THE TEST

6 0
3 years ago
What is the purpose of the product backlog refinement
BigorU [14]

Answer:

A

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • Write a class named RetailItem that holds data about an item in a retail store. The class should store the following data in att
    15·1 answer
  • If you were to mount a nonmetallic box to the front of a stud, what type of bracket should the box have? A. FP B. BP C. NP D. JP
    13·1 answer
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • What is the difference between a rack and a tower?
    8·1 answer
  • Two technicians are discussing a parasitic load test. Technician A says that the parasitic load is measured with an ammeter Tech
    13·1 answer
  • How does an individual's access to a wide range of online services affects their ability to operate safely in the digital world.
    5·1 answer
  • Which way do you swipe in ios to get to the control center
    15·1 answer
  • . Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!