Answer:
using more than one medium of expression or communication 
 
        
                    
             
        
        
        
Answer:
When printing a single contact, go to File and then Print; the only style available is Memo style . 
When printing multiple contacts, there are several styles to choose from
Explanation:
<em>The question has been answered (by you). I will help you with the explanation. The texts in bold in the answer section represent the answer.</em>
<em />
The question is an illustration of Microsoft outlook.
In Microsoft outlook, the default style of printing is the memo style of printing. This is the only form of printing allowed when printing single contacts. In other words, other forms of printing cannot be selected.
However, there are several options available when multiple contacts are to be printied. Some of the printing styles are:  phone directory style, card style, medium booklet style, etc.
 
        
             
        
        
        
La influencia de las redes sociales en la casa puede variar. Primero puede ser bueno porque podemos usar las redes sociales para ver recetas de cocina para hacer en casa. Segundo puede ser malo porque las personas de la casa podrían sufrir acoso cibernético .
        
             
        
        
        
colorfulness and depending on your teacher pick colors that will go together on the project 
 
        
             
        
        
        
The term vulnerability describes the issue that Adam discovered.
b. vulnerability
<u>Explanation:</u>
SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  
As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.