Answer:
1. The home tab
2. Font group
3. The small arrow at the bottom right of the font command group.
4. On "Font" heading (then "All text" subheading)
Explanation:
The following explanation will help Su in accomplishing her task.
1. Go to the home tab;
2. From the home tab, Su will have access to various command groups but in her case, she needs the Font command group.
3. There's a small arrow located at the bottom left of the font command group section; clicking on this arrow will open the font dialogue.
4. On the font dialogue, there are two headings. The "font" heading and the "character spacing" heading.
In her case, she needs the "Font" heading. The font heading also has various subheadings. To access the underline colour option, she needs the "All text" subheading.
See attachment for picture guide.
Answer:
c) 4.4
Explanation:
You can evaluate step by step the code. You know tha your input is 4.0
Step 1 Variables definitions:
double tax;
double total;
Step 2 Ask the user for the input:
System.out.print("Enter the cost of the item");
Step 3 read de input:
total = scan.nextDouble();
Step 4 evaluate the condition ( is the input greater or equal than 3.0 ? [True])
if ( total >= 3.0)
Step 5 get done the operations inside the condition and print it:
tax = 0.10;
System.out.println(total + (total * tax));
Answer:
There is no direct return on investment in building security systems.
Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.
There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.
Explanation:
Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers. New programs and customized demand of IT systems need customized IT security systems.
Answer:
B. External systems and technology architecture.
Explanation:
In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,
Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture