answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
2 years ago
7

In three to five sentences, explain how you would insert graphics using your word-processing software.

Computers and Technology
2 answers:
NNADVOKAT [17]2 years ago
8 0

Answer:

Word-processing programs allow the user to select a command from the menu to insert a graphic. Clicks in the document where you want your file, choose insert and picture click from file select the image the press open and you picture will become inserted in to the document.

Explanation:

madam [21]2 years ago
3 0
Most word-processing programs allow the user to select a command from the menu to insert a graphic. Clicks in the document where you want your file, choose insert and picture click from file select the image the press open and you picture will become inserted in to the document.
You might be interested in
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
1 year ago
First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newlin
ratelena [41]

Answer:

The program in Python is as follows:

valCount = int(input())

reports = []

for i in range(valCount):

   num = int(input())

   reports.append(num)

   

for i in reports:

   print(i,"reports.")

Explanation:

This gets input for valCount

valCount = int(input())

This creates an empty list

reports = []

This gets valCount integer from the user

<em>for i in range(valCount):</em>

<em>    num = int(input())</em>

<em>Each input is appended to the report list</em>

<em>    reports.append(num)</em>

This iterates through the report list

for i in reports:

This prints each element of the report list followed by "reports."

   print(i,"reports.")

4 0
1 year ago
You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
Anvisha [2.4K]

Potential uploaded viruses, personal information being lost, blackmail, identity theft.

7 0
1 year ago
How can migrating to an enterprise platform solution help a business improve employee productivity?
Lorico [155]

Answer:

By allowing all employees to access and share the same stored dats and by increasing the number of wmployees in business activities

Explanation:

#<em>carry on learning</em>

5 0
1 year ago
Although the optical discs are all 5 ¼”, a CD drive can not read a DVD disc, and a DVD drive can not read a Blu-ray disc. Why no
otez555 [7]

Answer:

For storing the data into a CD, we need to burn it. And the surface of the CD is comprised of the polycarbonate layer that is molded as the spiral tracks over the surface of the CD. And the Data is being stored as a sequence of minute grooves that are called the pits which are encoded on the spiral tracks. And the region in between the pits is known as lands.

The DVD or the digital video dos is based on the optical data storage which is almost the same as the CD. The analog data is transformed into the digital data, and this is encoded on the disc starting from the inside edge, and towards out. This digital information is being encoded into the surface as pits, and the surface acts as the recording layer. A DVD can hold data up to 4.77 to 8 GB.

Since DVD size is bigger than CD, A DVD drive can read CD, but the CD drive cannot read the DVD,

And unlike the above two, which make use of the red laser for reading and writing, the blu ray makes use of the blue laser. Also, it has the smaller pits, tiny beam as well as small track that together make it possible to store around 25 GB of data in one single blue ray disc. And this is five times more than the size of a DVD.  

The Blu ray Discs are good for playing the CD as well as DVD. However, the opposite is not possible due to the size.

Explanation:

Please check the answer section.

4 0
2 years ago
Other questions:
  • Write a loop that reads strings from standard input, where the string is either duck or goose. the loop terminates when goose is
    7·1 answer
  • What does a sticky CTA do?
    9·2 answers
  • Propane also known as LP gas, is often mixed with about _______ percent of other gases, such as butane, propylene, and mercaptan
    13·1 answer
  • An organization has a datacenter manned 24 hours a day that processes highly sensitive information. The datacenter includes emai
    5·1 answer
  • Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names
    13·1 answer
  • Write a program to determine all pairs of positive integers, (a, b), such that a &lt; b &lt; 1000 and [a2 + b2 + 1)/(ab) is an i
    13·1 answer
  • Why can a failure in a database environment be more serious than an error in a nondatabase environment?
    15·2 answers
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
  • The terminal window wants to evaluate your current bash knowledge by using the ~/workspace/nested-directories folder:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!