<span>To open the format cells dialog box with the alignment sheet active, tap or click the alignment setting button
</span>
Answer:
Following are the program in C++ language
#include <iostream> // header file
using namespace std; // namespace
int main() // main function
{
int number=0; // variable declaration
while(number>-1) // iterating the while loop
{
cout<<"body"<<endl; // dsiplay the statement
cin>>number; // Read the value by the user
}
cout<<endl<<"Done";// dsiplay the statement
return 0;
}
Output:
body
5
body
45
body
-8
Done
Explanation:
Following are the description of the statement
- Declared a variable "number" of int type and initialized with 0 to them
- iterating the while loop. In this loop print the message "body" and Read the value by the user in the "number" variable. This loop will be executed repeatedly until the user do not read the negative value.
- After the execution of the while loop, it prints the message "Done".
The advantage of inserting the page number field is that the page number field could show the current page number.
The following information should be relevant with respect to the page number:
- The page number field & the actual page number should be formatted.
- The page number field & the actual page number both could be inserted into the header or footer.
- The page number field & the actual page number could be easily inserted into the document.
Therefore we can conclude that the advantage of inserting the page number field is that the page number field could show the current page number.
Learn more about the page number here: brainly.com/question/3063419
Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Explanation:
Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.