The authentication can be done by using user id and password, social sign-in or by using the biometrics.
How to explain the information?Authentication works as follows:
Prompting the user to enter the credentials. Send credentials to the authentication server. Match the credentials. Authorize the user and grants the accesExternal Website security:
Use of firewall. Implement the access control. Use of MVC (Model View Controller) Use of encryption. Use of SSL certificate.Use of security plugins. Use of network monitoring team.Internal Website security:
Use of authentication to identify the user identity. Use of authorization to provide different user with the specific privileges and access. Encrypt or hide sensitive web pages. By implementing IT policies. Educate the user about the website.Remote Access Solution:
Remote access provides better security, cost efficiency, ease of management, and increased availability.
Remote access can be deployed by using the RAS gateway.
Firewall and Basic rules recommendations:
Firewall is important for managing the traffic and providing external website security. Rules to prevent SQL injection and XSS. Allow only the specific type of traffic. Use access rules for IP security. Implement certain IT policies.Wireless Security:
Wifi is being used in every organization and it prevents the network from malicious access.
Wireless security can be provided by usin encryption, decryption, and authorization.
VLAN configuration:
VLAN are important for traffic filtering and providing the logical division of the network.
VLAN can be configured for web interface and can provide web filtering.
VLAN can be configured between router and firewall that passes the network.
Laptop Security Configuration:
Use of password, VPN and the registering the laptop will provide laptop security. .
Application policy recommendations:
Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.
Security and privacy policy recommendations:
It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.
Intrusion detection or prevention for systems containing customer data:
IPS is implemented behind firewall and it matches the incoming traffic against the security policies.
Learn more about security infrastructure on:
https://brainly.com/question/5939963
#SPJ1
A _____ limits the webpage visitor to only one choice from a list of choices.
a. select control
b. textarea control
c. radio control
d. checkbox control
Answer:
Select Control
Explanation:
What (if any) are the same feature requirements that might be found in server software/OS environments
The same feature requirements that might be found in server software/OS environments
They include:
Server Hardware Requirements such as Quad-Core 2 Ghz or much more high, 8 GB RAM or more and also free disk space.What are the software requirements for a server?The Software requirements for any given database server includes;
Database server Operating system, etc.Some of the key features of the key server operating system is made up of: the capability to access the server when using either GUI and command-level interface. the ability to execute all or a lot of processes from OS commands and others.
Learn more about software/OS environments from
https://brainly.com/question/26424062
#SPJ1
what are the ways to deal with stress from workplace
Answer:
alcohol
Explanation:
speaking from experience
Explain how will you process identify and use texts according to the
function you wish for it to serve in the particular industry
The texts have different objectives that can be identified with the following tips:
Identify the major ideas.Identify the author's purpose.What is a text?
A text is a term to refer to the set of phrases and words contained coherently to be interpreted and to share the ideas of an author (emitter or speaker).
Texts can have a variety of topics counting on the author's intention. For example:
Scientific texts: They are the texts that have the purpose of sharing scientific knowledge with exact data and results of experiments or others.Literary texts: They are the best known texts that stand out for including a variety of topics, they are marked by telling an in-depth story.News texts: They are the texts that reveal all the details of a news story and have the goal of objectively reporting.According to the above, to identify a text it is necessary to read it and remember the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach crafts, knowledge and techniques counting on the requirement.
To learn more about texts, refer
https://brainly.com/question/25862883
#SPJ9
Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by the label in column L
The formula to enter, in the cell range M8:15 is =VLOOKUP($L$6,$A$6:$J$13,2,FALSE)
What are Excel formulas?Excel formulas are formulas that are used together with functions to perform arithmetic and logical operations
How to copy the formula?From the complete question, the formula in cell M7 is:
=VLOOKUP($M$6,$A$6:$J$13,2,FALSE)
The above formula uses absolute style of referencing.
This means that when the formulas are copied, the formulas would remain unchanged.
So, the formulas in the range M8 : M15 are:
=VLOOKUP($M$6,$A$6:$J$13,2,FALSE)
From the question, we understand that the column labels M are to be changed to label L.
So, the updated formula is:
=VLOOKUP($L$6,$A$6:$J$13,2,FALSE)
Hence, the formula to enter, in the cell range M8:15 is =VLOOKUP($L$6,$A$6:$J$13,2,FALSE)
Read more about Excel formula at:
https://brainly.com/question/14299634
#SPJ1
Complete questionCopy the formula in cell M7 is =VLOOKUP($M$6,$A$6:$J$13,2,FALSE) to the range M8:M15, and edit the copied formulas to return the value from the column indicated by the label in column L
can
Vehicles equipped with Anti-Lock Brakes (ABS)
stop in shorter distances than vehicles without ABS
No. Vehicles equipped with Anti-Lock Brakes cannot stop at shorter distances than vehicles without ABS.
Even if we reached the state where an AI can behave as a human does, how do we measure if Al is acting like a human? and how can we be sure it can continue to behave that way? We can base the human-likeness of an AI entity with the: Turing Test, the Cognitive Modelling Approach, The Law of Thought Approach, and the Rational Agent Approach. Explain in detail these terms with suitable examples.
We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
What test tells you if an AI can think like a human?The Turing Test is known to be the tool or the method that is unused in regards to the inquiry in artificial intelligence (AI) for a person to be able to known if or not a computer have the ability of thinking like a human being.
Note that the test is said to be named after Alan Turing, who was known to be the founder of the Turing Test and he was also known to be an English computer scientist, a cryptanalyst, a mathematician and also a theoretical biologist.
Therefore, in regards to the issues with AI, a person or We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
Learn more about Al from
https://brainly.com/question/20463001
#SPJ1
Explain the unique reasons why assembly language is preferred to high level language
The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Why is assembly language better than other kinds of high level?It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.
Note that it is one that has a lot of better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.
Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.
Hence, The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Learn more about assembler language from
brainly.com/question/13171889
#SPJ1
Which statement describes an advantage of DevOps
The correct statement that describes an advantage of DevOps is that It enables the capability to continuously release software with high confidence.
What are the advantages of DevOps?Teams who are known to fully uses DevOps practices are known to be one that often functions more smarter and also more faster, and they tend to deliver a good and better quality to their customers.
Note that there is an increased use of automation and also that of cross-functional collaboration that tends to lower complexity and errors.
Hence, The correct statement that describes an advantage of DevOps is that It enables the capability to continuously release software with high confidence.
See options below
A) It allows for a slower and more reasonable time frame for making fixes in production mode.
B) It enables the capability to continuously release software with high confidence.
C) It promotes individual efforts for both development and operations.
D) It provides a clear separation between application methods and infrastructure methods.
E) None of these
Learn more about DevOps from
https://brainly.com/question/24306632
#SPJ1
Write a program to demonstrate circular linked list with operations using pointers – insert
(beginning, end, middle), delete (beginning, end, middle),view)
A program to demonstrate circular linked list with operations using pointers is:
struct Node *addToEmpty(struct Node *last, int data)
{
// This function is only for empty list
if (last != NULL)
return last;
// Creating a node dynamically.
struct Node *temp =
(struct Node*)malloc(sizeof(struct Node));
// Assigning the data.
temp -> data = data;
last = temp;
// Note : list was empty. We link single node
// to itself.
temp -> next = last;
return last;
}
What is a Circular Linked List?This refers to the type of linked list in which the first and the last nodes are also joined together other to form a circle
Read more about circular linked list here:
https://brainly.com/question/12974434
#SPJ1
Are there every circumstances where u skip requirements engineering
No, there is no circumstances where you can skip requirements engineering. This is because the Requirements for engineering makes a bridge to set up and construction and it is one that a person cannot skipped.
Why is that many software developers pay enough attention to requirements engineering?Some software engineers are known to be people who are said to record initial software requirements.
The requirements of engineering is known to be a very difficult one and it is one that is made up of Unrealistic expectations demand unrealistic a lot of requirements that is known to be made up of factors that cannot be fulfilled but it is one that people or its student cannot skipped.
Therefore based on the above, my answer is No, there is no circumstances where you can skip requirements engineering. This is because the Requirements for engineering makes a bridge to set up and construction and it is one that a person cannot skipped.
Learn more about engineering from
https://brainly.com/question/17169621
#SPJ1
the implications your organization of providing email facilities to individuals in the workplace in terms of security and virus protection
Make use of multifactor authentication and a password manager: One of the most important aspects of protecting your email information is using passwords.
What is email facilities in security and virus protection?The first line of defense against a security compromise is a strong password. We constantly advise against using any universal passwords.
Email security is a term that describes a variety of procedures and tactics for protecting email accounts, data, and communications from unauthorized access, theft, or compromise.
Email is regularly used to spread threats like spam, phishing, and others. Relying solely on your built-in protection could leave your business vulnerable to fraudsters who routinely use the top attack vector.
Therefore, it means for your business in terms of security and virus prevention when you allow people to use email at work.
Learn more about email facilities here:
https://brainly.com/question/6946185
#SPJ2
Use a password manager and multifactor authentication: Using passwords is one of the most crucial components of protecting your email data.
Thus, A strong password is the first line of defence against a security breach.
A range of practices and strategies are referred to as "email security" in order to safeguard email accounts, data, and conversations from unwanted access, theft, or compromise.
Spam, phishing, and other risks are frequently disseminated over email. Relying exclusively on your built-in defences could expose your company to fraudsters that frequently exploit the most popular attack vector.
Thus, Use a password manager and multifactor authentication: Using passwords is one of the most crucial components of protecting your email data.
Learn more about Email, refer to the link:
https://brainly.com/question/16557676
#SPJ7
What is the output of the
given program if the user
enters 20?
A. A lot of fun
B. some fun
C. no fun
Consider the following
segment:
Scanner
Scanner(System.in);
input
System.out.print("Please
value");
int value =
fun");
}
else
{
input.nextInt();
if (value >= 30 )
{
program
enter
System.out.println("A
lot
new
a
of
5
if(value_ 30)
Explanation:
es igual 30 espero que te sirva
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?
The troubleshooting step that you should take next is to Question User.
What is Troubleshooting?This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.
Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.
Read more about troubleshooting here:
https://brainly.com/question/13818690
#SPJ1
Rewrite the code below so that a transformation moves the div 100px to the right and 50px upward.
Relocate me!
Using the knowledge in computational language in HTML it is possible to write a code that below so that a transformation moves the div 100px to the right and 50px upward.
Writting in HTML code:<!DOCTYPE html>
<html>
<head>
<style>
div {
width: 300px;
height: 100px;
background-color: yellow;
border: 1px solid black;
transform: translate(50px,100px);
}
</style>
</head>
<body>
<h1>The translate() Method</h1>
<p>The translate() method moves an element from its current position:</p>
<div>
This div element is moved 50 pixels to the right, and 100 pixels down from its current position.
</div>
</body>
</html>
See more about HTML at brainly.com/question/19705654
#SPJ1
What would be the most professional choice of words for your response:
A. THIS WASN’T FOR ME.
B. Please stop spamming me with these messages for my coworker.
C. I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.
the answer is C. ur welcome
The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.
Check more about writing below.
What is “Word Choice” in Writing?'Word Choice” in writing is known to be a term that connote the ways or the usage of words that is said to be effective and precise use of language.
This is one that often conveys information and it also tends to enlighten the reader.
Note that option C is correct because it is best and most professional way to respond to a statement.
Hence, The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.
Learn more about word choices from
https://brainly.com/question/1619714
#SPJ1
what happens when a pod in namespace com tries to hit hostname
When a pod in namespace com tries to hit hostname, an administrator might only be able to see the pods in one namespace.
What is the difference between a pod and a namespace?Although it also makes use of a container runtime, a container executes logically in a pod; A cluster supports a collection of connected or unrelated pods.
On a cluster, a pod is a replication unit; Numerous pods that are connected or unrelated may be found inside a cluster that is divided up into namespaces.
Learn more about pod:
https://brainly.com/question/27038008
#SPJ1
1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
10,9,8,7,6,5,4,3,2,1 – Worst case - Sorted in reverse order
1,3,2,5,4,7,9 ,6,8,10 – Avg case – numbers are in random order
For the given numbers, please use the following algorithms (bubble sort, insertion sort & selection
sort) to sort in ascending order. Please also find out number of comparisons and data movements
for each algorithm. Based on comparisons and data movements please rate algorithm for each input
case.
Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers
Writting the code in python:
def shellSort(array, n):
# Rearrange elements at each n/2, n/4, n/8, ... intervals
interval = n // 2
while interval > 0:
for i in range(interval, n):
temp = array[i]
j = i
while j >= interval and array[j - interval] > temp:
array[j] = array[j - interval]
j -= interval
array[j] = temp
interval //= 2
data = [10,9,8,7,6,5,4,3,2,1]
size = len(data)
shellSort(data, size)
print('Sorted Array in Ascending Order:')
print(data)
See more about python at brainly.com/question/18502436
#SPJ1
const x = 0;
while(x < 5) {
alert(x);
x = x + 1;
}
In the above while loop, which line is responsible for checking the condition for whether or not the code within the while loop should execute?
const x = 0;
while(x < 5) {
alert(x);
x = x + 1;
The line responsible for checking the condition for whether or not the code within the while loop should execute is while(x < 5) {
What is a repeat structure in python?
The repetition structure is a feature of programming languages responsible for executing a block of code repeatedly while a certain condition is met.
In Python, there are two types of looping structures: for and while.
The while command causes a set of commands to be executed while a condition is met. When the result of this condition becomes false, the loop execution stops.
With that being said:
Given
const x = 0;
while(x < 5) {
alert(x);
x = x + 1;
}
See more about python at: brainly.com/question/13437928
#SPJ1
In python please:
Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key ‘marsupial’ exist in the dictionary. If so, delete ‘marsupial’ and it’s associated value. If the key is not the dictionary, display a message indicating so.
Answer:
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
Explanation:
So you can use the keyword "in" to check if a certain key exists.
So the following code:
"
if key in object:
# some code
"
will only run if the value of "key" is a key in the object dictionary.
So using this, we can check if the string "marsupial' exists in the dictionary.
"
if 'marsupial' in dictionary:
# code
"
Since you never gave the variable name for the variable that references a dictionary, I'm just going to use the variable name "dictionary"
Anyways, to delete a key, there are two methods.
"
del dictionary[key]
dictionary.pop(key)
"
Both will raise the error "KeyError" if the key doesn't exist in the dictionary, although there is method with pop that causes an error to not be raised, but that isn[t necessary in this case, since you're using the if statement to check if it's in the dictionary first.
So I'll just use del dictionary[key] method here
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
The last part which I just added in the code is just an else statement which will only run if the key 'marsupial' is not in the dictionary.
In Python Code:
* Using the MorseCode.csv file, read the file and process the comma separated variables. See the Elements.py file for an example of reading a CSV file. File excerpt:
A,.-
B,-...
C,-.-.
D,-..
E,.
* Design a Morse Code class to contain ASCII and Morse Code characters. For example, the Morse Code for the letter 'C' is "-.-.".
* Add the Dunders to the Morse Code class to support: initialization, iterating, printing, searching, sorting.
* Design a Morse Code collection class to contain the 39 Morse Code characters listed in the CSV file. The Morse Code collection class contains an internal Dictionary for storing each individual Morse Code characters.
* Demonstrate your Dunders work correctly for initialization, iterating, printing, searching and sorting.
Morse Codes:
E .
T -
A .-
I ..
M --
N -.
D -..
G --.
K -.-
O ---
R .-.
S ...
U ..-
W .--
B -...
C -.-.
F ..-.
H ....
J .---
L .-..
P .--.
Q --.-
V ...-
X -..-
Y -.--
Z --..
0 -----
1 .----
2 ..---
3 ...--
4 ....-
5 .....
6 -....
7 --...
8 ---..
9 ----.
Elements code:
class Element :
def __init__(self,nu,ab,na) : # constructor
self.number = int(nu)
self.abbrev = ab
self.name = na
def __str__(self): # string conversion operator
return str(self.name + '\t' + self.abbrev + '\t' + str(self.number))
def __lt__(self,right): # less-than operator
print(str(self.number) + "__lt__" + str(right.number))
return self.number < right.number
def __eq__(self,right): # equality operator
print(str(self.number) + "__eq__" + str(right.number))
return self.number == right.number
class PeriodicList :
def __init__(self): #constructor
self.table = []
def __getitem__(self,index):
print("__getitem__ index = ",index)
return self.table[index]
def __setitem__(self,index,value):
print("__setitem__ index = ",index,value)
self.table[index] = value
def __str__(self) :
stable = ""
for i in range(0,len(self.table)):
stable = stable + str(self.table[i])
return stable
def Sort(self):
self.table.sort()
def Reader(self,csvfile):
csv = open(csvfile)
for line in csv :
rline = line.rstrip()
cline = rline.split(',')
e = Element(int(cline[0]),cline[1],cline[2])
self.table.append(e)
def main():
pt = PeriodicList()
pt.Reader('ptable.csv')
print(pt) # sorted by name
pt.Sort()
print(pt) # sorted by number
efind = Element(80,"Hg","Mercury")
if efind in pt:
print("Found: ",efind)
if __name__=="__main__":
main()
* This requires 2 classes not 1 Class
The C++ program that shows how to demonstrate Morse code is given below:
C++ Code// CPP program to demonstrate Morse code
#include <iostream>
using namespace std;
// function to encode a alphabet as
// Morse code
string morseEncode(char x)
{
// refer to the Morse table
// image attached in the article
switch (x) {
case 'a':
return ".-";
case 'b':
return "-...";
case 'c':
return "-.-.";
case 'd':
return "-..";
case 'e':
return ".";
case 'f':
return "..-.";
case 'g':
return "--.";
case 'h':
return "....";
case 'i':
return "..";
case 'j':
return ".---";
case 'k':
return "-.-";
case 'l':
return ".-..";
case 'm':
return "--";
case 'n':
return "-.";
case 'o':
return "---";
case 'p':
return ".--.";
case 'q':
return "--.-";
case 'r':
return ".-.";
case 's':
return "...";
case 't':
return "-";
case 'u':
return "..-";
case 'v':
return "...-";
case 'w':
return ".--";
case 'x':
return "-..-";
case 'y':
return "-.--";
case 'z':
return "--..";
case '1':
return ".----";
case '2':
return "..---";
case '3':
return "...--";
case '4':
return "....-";
case '5':
return ".....";
case '6':
return "-....";
case '7':
return "--...";
case '8':
return "---..";
case '9':
return "----.";
case '0':
return "-----";
default:
cerr << "Found invalid character: " << x << ' '
<< std::endl;
exit(0);
}
}
void morseCode(string s)
{
// character by character print
// Morse code
for (int i = 0; s[i]; i++)
cout << morseEncode(s[i]);
cout << endl;
}
// Driver's code
int main()
{
string s = "geeksforgeeks";
morseCode(s);
return 0;
}
Read more about C++ programming here:
https://brainly.com/question/20339175
#SPJ1
Although they can display a wealth of data, why should chord diagrams be used with caution?
a-Chord diagrams are particularly susceptible to fisheye distortion as you focus on certain data points.
b-It is difficult to determine from the rectangles how much of the full data set a particular object accounts for.
c-All connections are shown by default, which can make seeing specific connections difficult.
d-It is difficult for readers to parse curving lines because of the way human perception works.
Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because: A. Chord diagrams are particularly susceptible to fisheye distortion as you focus on certain data points.
What is data?Data can be defined as a representation of factual instructions (information) in a formalized manner, especially as a series of binary digits (bits) that are used on computer systems in a company.
In this scenario, the essential features of a data which every department manager should list include the following:
Strong securityCentralizationProgrammatic access.What is a chord diagram?A chord diagram can be defined as a type of chart that is typically designed and developed to graphically represent or display the inter-relationships (many-to-many relationship) between data in a matrix, especially as curved arcs within a circle.
Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because they are particularly susceptible, vulnerable, or prone to fisheye distortion as the end user focus on certain data points.
Read more on data here: brainly.com/question/13179611
#SPJ1
To set up scenarios,then set up a list, then set up the reference cell. to set up the cells that display the output results from the scenario. what do you use
To set up the cells that display the output results from the scenario, you will use data table , then Vlookup and Choose.
What do you use to set up the cells that display the output results from the scenario?In setting up the cells that display the output results from the scenario, then the first thing needed is data table which is necessary when setting up a list.
Followed by the , Vlookup which is used in the setting up of the reference cell and lastly Choose.
Learn more about reference cell on:
https://brainly.com/question/21644802
#SPJ1
write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calculated as the average of 4 marks.
Using the knowledge in computational language in algorithms it is possible to write the code being determine a student's final grade and indicate whether it is passing or failing.
Writting the algorithm :
Start
Take 4 integer inputs for the different 4 subject like math, english, physics, chemistry.
Then calculate the grade based upon the average of four marks .
grade = ( math + english + physics + chemistry ) / 4
if the value of the grade is more than 40, it will print pass otherwise it shows fail.
END
See more about algorithm at brainly.com/question/22984934
#SPJ1
13. Document the purpose of the
Managed pipeline mode settings.
The purpose of the Managed pipeline mode settings is to enable backward compatibility.
What is a Managed Pipeline?
This refers to the process that is in use in most CMS systems to process and direct sales that would be made at a later date.
Hence, we can see that when using a managed pipeline, the mode settings have the function to enable backward compatibility and the queue length can be set by using the "Queue Length" option
Read more about backward compatibility here:
https://brainly.com/question/13684627
#SPJ1
The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.
Answer:
Save of data is the answer
which of the following numbers may result from the following function: RANDBETWEEN 500, 700
512 is known to be the number that one can say may result from the following function: RANDBETWEEN 500, 700.
What is RANDBETWEEN function?In regards to Excel, the term RANDBETWEEN function is known to be a kind of a formula syntax and it is one whose usage of the RANDBETWEEN function can be seen only in Microsoft Excel.
The Description is that it helps to Returns a random integer number that exist between the numbers a person did specify.
Note that A new random integer number is said to be returned every time the worksheet is known to be calculated.
Therefore, 512 is known to be the number that one can say may result from the following function: RANDBETWEEN 500, 700.
Learn more about function from
https://brainly.com/question/179886
#SPJ1
Match the feature to its function.
1. Normal View
provide rows of icons to perform different tasks
2. Notes View
displays thumbnails
3. Slide Pane
place where information for handouts can be added
4. Title Bar
provides filename and Minimize icon
5. Toolbars
working window of a presentation
The Matchup of the feature to its function are:
1. Normal view the place where creating and editing occurs .
2. Notes view an area in which information for handouts can be added.
3. Slide pane the place where the slide order can be changed.
4. Menu bar contains lists of commands used to create presentations
5. toolbars provide rows of icons to perform different tasks.
What is the normal view?Normal view is known to be the view that is seen or used in editing mode and this is where a person can work a lot of items so that they can create their slides.
Note that Normal view is one that shows slide thumbnails on the left, that is a large window that depicts the current slide, and also has a section that is often seen below the current slide.
The Matchup of the feature to its function are:
1. Normal view the place where creating and editing occurs .
2. Notes view an area in which information for handouts can be added.
3. Slide pane the place where the slide order can be changed.
4. Menu bar contains lists of commands used to create presentations
5. toolbars provide rows of icons to perform different tasks.
Learn more about Normal View from
https://brainly.com/question/14596820
#SPJ1
List three types of information that may be downloaded form a website.
Answer:is it a safe website, is it a well known website and is it a updated website
Explanation:
The three types of information that may be downloaded from a website are A picture or some content or some videos.
What is a Website?A website is a collection of web pages and related material that is published on at least one web server and given a shared domain name. The World Wide Web is the aggregate name for all publicly accessible websites.
On the World Wide Web, a web page (also known as a website) is a hypertext document. A web server sends web pages to the user, who then sees them on a web browser. A website is made up of several web pages connected by a common domain name. The term "web page" refers to a collection of paper pages that have been bound into a book.
A website is a collection of several HTML-written web pages that are stored digitally (HyperText Markup Language). Your website must be saved or hosted on a computer that is always linked to the Internet if you want it to be accessible to everyone in the world. Web servers are this kind of machine.
The World Wide Web is made up of all websites. The website may be of numerous forms, such as an e-commerce website, social networking website, or blog website, and each plays a unique role. However, each website contains a number of connected web pages.
To read more about the Website, refer to - https://brainly.com/question/14408750
#SPJ2
Capgemini
Which among the following statements are not true?
RPA automates business process service activities by utilising the
presentation layer.
ITPA involves connecting the application servers, databases, operating
system and other components at the IT layer and automates the
process flow and creates the scripts and schedule them at the
scheduler in the Orchestrator.
RPA is completely rule based and works on structured data . It isn't
compatible to be applied on unstructured data.
Cognitive systems self learn from the processes based on historical
patterns.
Answer:
RPA is completely rule based