The item that would be most likely to keep in a database would be the payroll records. The other items such as address book, financial statements and sales reports would not necessarily be placed in a database.
The answer would be letter A.
<u>Answer</u>:
To quickly modify fonts, colours, and effects on a slide, a user can modify the Theme.
<u>Explanation</u>:
In Microsoft power point a theme is a group or collection of fonts , colours and effects that are pre-formatted to improve or enhance the presentation. We can start changing the font , colours or effects or any pre-existing themes by selecting them.
To Change colour:
- In Design tab, under the Variants group, click on the downward and choose one colour from the colour variant gallery.
- Now click on the customise colours which opens the "Create New Theme Colours" dialog box. In this dialog box , in the theme colours we can make the necessary changes and save them as a new theme.
To change fonts:
- In the View tab, choose Slide Master.In this tab, select "Fonts" and then select Customise Fonts.
- Now "Create New Theme Fonts" dialog box opens where use can choose the required font size under the Heading font and Body font boxes. Again this can be saved as a new theme. Changing the font of theme changes all the bullet texts and title.
Answer:
Trojan horse
Explanation:
mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.
hope it helps .
Answer:
Available options in question are
- a firewall :
- a server
- an application
- control standard
Answer is : Control Standard. It is not an example of layer of security.
Explanation:
Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.
- A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
- A server is typical example of physical control. In this it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.
- An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples
Control Standard is not an example of Layered Security.