answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
2 years ago
14

Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline

is linked to his presentation slides, and it contains excerpts from an older Certified Public Accountant manual. A new edition of this manual has just been released. Which describes the easiest way that Brad could modify his presentation to reflect the newer accounting information? He could copy and paste the new excerpt into PowerPoint and Word. He could modify the Word document. He could make a new outline. He could rename the Word file and repaste the excerpt.
Computers and Technology
1 answer:
AURORKA [14]2 years ago
5 0
The easiest way that Brad could modify his presentation to reflect the newer accounting information is : He could modify the Word document.  Since the<span> Word outline is linked already to his presentation slides, the new edition would automatically be in his PowerPoint Presentation.  </span>
You might be interested in
A Linux systems admin reported a suspicious .py file that ran on a daily schedule after business hours. The file includes shellc
raketka [301]

Answer: Python script

Explanation:

Based on the information given in the question, the type of script that is executing this shellcode is the Python script.

The Python script is a file that contains codes that are written in Python. In such case, the file which contains the python script typically has an extension

which is ".py"' or ".pyw" when it's run on windows

Therefore, based on the information given, the answer is Python script.

8 0
2 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
2 years ago
Drag each tile to the correct box.
garri49 [273]
I think select the video insert select the movie option under illustrations resize the video player then select the insert tab i’m not 100 percent sure tho
8 0
2 years ago
Read 2 more answers
A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.
Minchanka [31]

Answer:

10.1.1.150:80

Explanation:

Socket address is the combination of an IP address and port number.

HTTP is what most unencrypted webpage use, instead of HTTPS which is the encrypted version of HTTP.

By default, webserver using Hypertext Transfer Protocol (HTTP) uses a standard port known as port 80.

The Socket address which is the combination of the IP address and standard port number will be something like this:

10.1.1.150:80

3 0
2 years ago
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
2 years ago
Other questions:
  • The adjusted cell references in a copied and pasted formula are called ____ cell references.
    7·1 answer
  • What is a cursor?
    6·2 answers
  • 5.William travels a lot on business purpose. He needs to regularly communicate with his business partner. He also needs to send
    15·1 answer
  • Mel is skilled in identifying the technical, economic, and organizational feasibility of software. In which phase of SDLC should
    13·1 answer
  • In evaluating the precedence rules used by Python, what statement is accurate? a. Addition and subtraction are evaluated after a
    8·2 answers
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • A class of Students was previously defined with the following properties: a string name, an integer age, a Boolean variable indi
    14·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!