1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
13

If your DTP document contains watermarks on every page, where can you place them?

Computers and Technology
2 answers:
GaryK [48]3 years ago
8 0
Under text and make it look like they belong
ratelena [41]3 years ago
7 0

Answer:

Explanation:

Which of these are correct guidelines to use when creating a DTP document?

Use as many different fonts as you can to differentiate text elements. Use a single space after a punctuation mark. Use two hard returns after every paragraph. Uses boxes for every paragraph. Clip art should be used only when necessary.

You might be interested in
Review the portion of the application above. Record any changes or corrections that need to be made and why.
crimeas [40]

Answer:

Necessary Corrections: First Name and Last Name are recorded in incorrect boxes. Scribbles on errors instead of making corrections Does not include information in the SSN or Desired Salary blank Does not list which position she is applying for Has box checked that she has worked for the company, but does not say when For education just wrote “Yes” instead of listing the high school and address Justification: All of this make the applicant appear less professional and hurt her chances of getting hired. She is not following the directions properly, and she is not asking questions so that she can accurately fill out the application.

(I got a 100% so I know its correct)

4 0
2 years ago
You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every day
Vika [28.1K]
Those who use pirate software:
<span>1)Increase the chances that the software will not function correctly or will fail completely
2)Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes
3)Have no warranty to protect themselves
4)Increase their risk of exposure to a debilitating virus that can destroy valuable data
5)May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy
6)Are subject to significant fines for copyright infringement</span>
5 0
3 years ago
What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?
Lyrx [107]

Answer:

The fastest way to obtain the revocation status of digital certificate of the website is by using Online certificate Status Protocol (OSCP).

Explanation:

Online certificate status protocol is the protocol that help user to check and verify the digital certificate revocation status. This protocol is linked with the digital certificate issuance authority. Whenever someone want to verify the status of the digital certificate that is attached to access the website. The website administrator can send the request to OSCP handler to ensure the status of the certificate. The OSCP handler is connected through certificate issuance authority, send the detail to verify the status. After verifying the status, OSCP handler respond as certificate is valid or revoked to the concerned user.

5 0
3 years ago
The ___ are documents which uses http ?
givi [52]
The HTML is the answer
5 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Other questions:
  • Your friend is working on fixing their Homework assignment. They need a lot of help. You know all the bugs in the file, but due
    12·1 answer
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • A personal career profile for can be used to match what you know about yourself to what you know about different careers
    7·2 answers
  • / List the seven basic internal components found in a computer tower.
    5·2 answers
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • printLarger is a method that accepts two int arguments and returns no value. Two int variables, sales1 and sales2, have already
    11·1 answer
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • Which type of inventory control is expensive but helps keep inventory especially secure? A. RFID tags B. Barcodes C. Visual merc
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!