what level of security access should a computer user have to do their job?

Answers

Answer 1

Answer:

A computer user should only have as much access as required to do their job.

Explanation:

A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat.  By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user.  Never allow permission higher than what are needed to accomplish the task.

Cheers.


Related Questions

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem

Answers

Answer:

the issued Automatic Private IP Addressing (APIPA) address.

Explanation:

Since we are told that the user was able to access the network resources yesterday, and all the network equipment in the user's computer is functioning properly, there is a very high possibility that because the user's computer has been issued an Automatic Private IP Addressing (APIPA) address, it affected his computer's ability to connect to a public network.

This is the case because private network IP addresses are known to prevent inflow and outflow of data onto public networks.

If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.

Answers

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior gatewayExterior gateway

Answers

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

The protocol that communicates data between routers representing the edges of autonomous systems is called Exterior Gateway Protocol (EGP).

Here,

An autonomous system (AS) is a collection of routers that are under a single administrative domain and have a common routing policy. These autonomous systems can be Internet Service Providers (ISPs), large organizations, or even smaller networks.

EGP is specifically designed to exchange routing information between routers that are at the edges of these autonomous systems. It allows routers in different autonomous systems to communicate with each other and share information about the best paths to reach various network destinations.

Know more about Autonomous system,

https://brainly.com/question/30240559

#SPJ6

1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?

Answers

Answer:

Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.

Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.

The one advantage of bigdata is

To ensure hire the right employees.

The application of bigdata data is

to communicate media application nd entertainment

why is operating system pivotal in teaching and learning

Answers

Answer:

Kindly see explanation

Explanation: The operating system is a huge part of a computer system which plays a an invaluable role in the working of computer programs, hardwares and influences the overall experience of the user. It operating system serves as the interface between the computer hardware itself and the user who may wish to perform different tasks using a computer. In other to teach and learn, it is necessary to input and also obtain output, store our files and process and most essentially one may need to install application programs or softwares, all these functions are made possible with the help of an operating system. In essence, a system without an operating system can perform very little to no function at all. So basically teaching and learning becomes difficult. Teaching and Learning tools such as video, writing and other application softwares cannot be installed without an operating system and thus teaching or learning becomes impossible in it's absence.

You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.

Answers

Answer:

i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections

Explanation:

Raj was concentrating so much while working on his project plan that he was late for a meeting. When he went back to his office, he noticed his system was restarted and his project file was not updated. What advice would you provide Raj in this situation?

Answers

Answer:

Explanation:

Depending on the software that Raj was using to create his project he should first see if the software itself saved the project. Usually many software such as those included in the Microsoft Office Suite save the file automatically every 5 minutes or so in case of a power outage or abrupt closure of the file. If this is not the case he should try and do a system restore with the unlikely hope that it restores an older version of his project.

In a situation like this, it would be advisable for Raj to contact IT personnels and seek if the files could be retrieved.

Raj being late for a meeting due to what he was doing meant that the project he was working on is very important.

Therefore, to avoid losing thses files, he could contact the IT personnels and request if there is a way to retrieve the project file.

These way, the files could be retrieved and avoid losing his work.

Learn more : https://brainly.com/question/15315011

What type of function is being performed when a router screens packets based on information in the packet header

Answers

Answer:

"Router screening" is the correct option.

Explanation:

A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

Assume a client calls an asynchronous RPC to a server, and subsequently waits until the server returns a result using another asynchronous RPC. Is this approach the same as letting the client execute a normal RPC

Answers

Answer:

This approach is not the same as letting the client execute a normal RPC

Explanation:

This approach is not the same as letting the client execute a normal RPC and this is because an asynchronous RPC sends an additional message across the network after the initial call/message is sent by the sender to the client. this additional message sent through the network is directed towards the sender of the initial call/message as an acknowledgement of the receipt of the initial message by the client .

synchronous RPC is made of two asychronous RPCs, hence the client executing a normal RPC  will not establish a reliable communication between the client and the sender as asynchronous RPC would

During the name resolution process, which technique is used to avoid congestion when querying a server

Answers

Answer:

"NOT lookup " is the correct approach.

Explanation:

This methodology significantly reduces the quantity of congestion of DNS messages on a certain file. The application establishes that whenever a question reaches if it is processed. Unless the file is loaded, then perhaps the response is returned with the cached cache.Typically the name resolution occurs in something like a DNS File. The conversion usually occurs throughout this cycle from Username to IP, including IP via Username.

Is it appropriate to send an email and call the individual the same day to ask if they have received your email?

Answers

Answer:

It depends. (OPINION)

Explanation:

If this is an important email, and it REALLY had to be sent the day of, then yes, it may be appropriate to call the day of. However, if you procrastinated until the last day and are really worried; well; that's your fault. At least wait a day and give the receiver some time to process; they could be really busy. At least that's how I view it.

Write a CashRegister class that can be used with the RetailItem class that you wrote in Chapter 6's Programming Challenge 4. The CashRegister class should simulate the sale of a retail item. It should have a constructor that accepts a RetailItem object as an argument. The constructor should also accept an integer that represents the quantity of items being purchased. In addition, the class should have the following methods:
• The getSubtotal method should return the subtotal of the sale, which is the quantity multiplied by the price. This method must get the price from the RetailItem object that was passed as an argument to the constructor.
• The getTax method should return the amount of sales tax on the purchase. The sales tax rate is 6 percent of a retail sale.
• The getTotal method should return the total of the sale, which is the subtotal plus the sales tax.

Demonstrate the class in a program that asks the user for the quantity of items being purchased and then displays the sale’s subtotal, amount of sales tax and total.

Answers

Answer:

Following are the code to this question:

import java.util.*; //import package for user input

class RetailItem//defining class RetailItem  

{

private String desc;//defining String variable

private int unit;//defining integer variable

private double prices;//defining double variable

RetailItem()//defining default Constructor

{

   //Constructor body

}

Output:

The Sub Total value: 199.75

The Sales Tax value: 11.985

The Total value: $211.735

Explanation:

In the above code three class "RetailItem, CashRegister, and Main" is defined, in the class "RetailItem", it defines three variable that is "desc, unit, and prices", inside the class "get and set" method and the constructor is defined, that calculates its value.

In the next step,  class "CashRegister" is defined, and inside the class parameterized constructor is defined, which uses the get and set method to return its value.  

In the next step, the main class is declared, in the main method two-class object is created and calls its method that are "getSubtotal, getTax, and getTotal".  

There is some technical error that's why full code can't be added so, please find the attached file of code.  

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}

Answers

Answer:

Replace

/* Your solution goes here */

with

if (bagOunces < 2) {

   System.out.print("Too Small");

}

else if(bagOunces > 10) {

   System.out.print("Too Large");

}

else {

   System.out.print((bagOunces * 6)+" seconds");

}

Explanation:

This line checks if bagOunces is less than 2;

if (bagOunces < 2) {

If yes, the string "Too Small" is printed

   System.out.print("Too Small");

}

This line checks if bagOunces is greater than 10

else if(bagOunces > 10) {

If yes, the string "Too Large" is printed

   System.out.print("Too Large");

}

The following condition is executed if the above conditions are false

else {

This multiplies bagOunces by 6 and adds seconds

   System.out.print((bagOunces * 6)+" seconds");

}

Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time?

Answers

Answer:

a. Local user profile.

Explanation:

Local user profile is a type of user profile which is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time and it is being stored on the local hard disk of the computer.

Generally, in Microsoft windows any change made to the local user profile is peculiar to the user and the host computer on which the change is made.

Hence, local user profiles avails several users the opportunity of sharing a single computer with their respective user settings and data.

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page

Answers

Answer:

The correct answer is "List of posts with the most recent ones at the top".

Explanation:

A website that includes someone else's thoughts, insights, views, etc. about a writer or community of authors and that also has photographs as well as searching the web.It indicates that perhaps the blog should distinguish between different articles about the site because then customers who frequent the site will observe and experience the articles on everyone's blogs.

So that the above would be the appropriate one.

Write a CREATE VIEW statement that defines a view named InvoiceBasic that returns three columns: VendorName, InvoiceNumber, and InvoiceTotal. Then, write a SELECT statement that returns all of the columns in the view, sorted by VendorName, where the first letter of the vendor name is N, O, or P.

Answers

Answer:

CREATE VIEW InvoiceBasic  AS

SELECT VendorName, InvoiceNumber, InvoiceTotal  

FROM Invoices JOIN Vendors ON Invoices.InvoiceID = Vendors.VendorID  

WHERE left(VendorName,1) IN ('N' , 'O ' , 'P' )

Explanation:

CREATE VIEW creates a view named InvoiceBasic  

SELECT statements selects columns VendorName, InvoiceNumber and InvoiceTotal   from Invoices table

JOIN is used to combine rows from Invoices and Vendors table, based on a InvoiceID and VendorsID columns.

WHERE clause specified a condition that the first letter of the vendor name is N, O, or P. Here left function is used to extract first character of text from a VendorName column.

"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instructions."

Answers

Answer:

Locality of reference.

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

1. Describe your Microsoft word skills that need to be improved upon the most. 2. Explain the Microsoft word skills you are most confident in performing. 3. How can your Microsoft word processing skills affect your overall writing skills on the job?

Answers

Answer:

The answer varies from person to person.

Explanation:

All kinds of people are using Word, so people would recognize if the answer if plagiarized. So, simply answer truthfully; no matter h1ow embarrasing.

The Microsoft word skills that I will need to improve upon the most is how to be faster when typing.

It should be noted that the Microsoft word skill that I am mostly confident in performing is the creation of word documents and text formatting.

Lastly, Microsoft word processing skills have affected my overall writing skills on the job as it has helped in improving my writing and grammar.

Learn more about Microsoft on:

https://brainly.com/question/20659068

What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis and design (SAD)?

Answers

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

The complex issues are simply solved.    The operation of very fast recovery.  The stability in condition changes. Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.

A device driver would ordinarily be written in :__________
a. machine language
b. assembly language
c. a platform-independent language, such as Java
d. an application-oriented language

Answers

Answer: Assembly language

Explanation:

A device driver is a computer program that is in charge of the operation or the controls of a device attached to a computer.

device driver would ordinarily be written in an assembly language. Assembly language is a low-level symbolic code that is converted by an assembler. It is typically designed for a particular type of processor.

Write an interactive program to calculate the volume and surface area of a three-dimensional object.

Answers

Answer:

I am writing a Python program:

pi=3.14 #the value of pi is set to 3.14

radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere

surface_area = 4 * pi * radius **2 #computes surface area of sphere

volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere

print("Surface Area of sphere is: ", surface_area) #prints the surface area

print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume        

Explanation:

Please see the attachment for the complete interactive code.

The first three lines of print statement in the attached image give a brief description of the program.

Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.

The psuedocode for this program is given below:

PROGRAM SphereVolume

pi=3.14

NUMBER radius, surface_area, volume  

INPUT radius

COMPUTE volume = (4/3) * pi* radius ^3

COMPUTE surface_area = 4 * pi * radius ^ 2

OUTPUT volume , surface_area

END

Vehicles driving in the opposite direction on a multi-lane highway with opposite lanes separated by a painted line must stop for school buses.
A. TRUE
B. FALSE

Answers

True? I think that’s it’s true, it’s different here in Canada

For this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.

Answers

Answer:

import csv

import sys

file_csv = argv

with open( "file_csv", "rb" ) as file:

      rowlist= csv.DictReader( file )

      dict_count={ }

      for row in rowlist:

           dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1

      print( " The count of employees per department are", dict_count )

Explanation:

The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.

Input a list of positive numbers, find the mean (average) of the numbers, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the result. Use a subprogram to Input the numbers, a Function to find the mean and a subprogram to output the Result.

Answers

Answer:

def inputNumber():

   l = []

   num = int(input("Enter the number of integers you want to enter\n"))

   for i in range(0,num):

       print("Enter the ", i+1, " integers ")

       a = float(input())

       l.append(a)

   return l

def averageCalculator(l):

   total = 0

   for i in l:

       total += i

   avg = total/len(l)

   return avg

def printoutput(avg):

   print("The average of numbers is ", avg)

l = inputNumber()

avg = averageCalculator(l)

printoutput(avg)

Explanation:

A subprogram may be considered as a method where we pass some values in the arguments and return some value.

The answer is written in python language, where we have used

inputNumber() subprogram to get the input from the user.

function averageCalculator() to calculate the average.

printoutput() subprogram to print the output or the average of the numbers.

Please refer to the attached image for better understanding of the indentation of code.

Now, let us learn about them one by one:

inputNumber(): We get the number of values to be entered as an integer value and then get the numbers as float.

Store the values in a list and return the list to the caller main program.

averageCalculator(l): Contains a list as argument as we got from inputNumber(). It sums all the numbers and divides with total number to find the average. Returns the average value to the caller main program.

printoutput(avg): Contains an argument which is the average calculated in the averageCalculator(). It prints the argument passed to it.

Write a program that asks the user to enter a series of numbers separated by commas. Here is an example of valid input: 7,9,10,2,18,6 The program should calculate and display the sum of all the numbers.

Answers

Answer:

Here is the JAVA program. Let me know if you need the program in some other programming language.

import java.util.Scanner; // used for taking input from user

public class Main{ //Main class

public static void main(String[] args) {//start of main() function body

  Scanner scan = new Scanner(System.in); // creates a Scanner type object

   String input; // stores input series

    int sum = 0; //stores the sum of the series

    System.out.println("Enter a series of numbers separated by commas: "); //prompts user to enter a series of numbers separated by comma

     input = scan.nextLine(); //reads entire input series

     String[] numbers = input.split("[, ]"); //breaks the input series based on delimiter i.e. comma and stores the split sub strings (numbers) into the numbers array

   for (int i = 0; i < numbers.length; i++) { //loops through each element of numbers array until the length of the numbers reaches

          sum += Integer.parseInt(numbers[i]); } // parses the each String element of numbers array as a signed decimal integer object and takes the sum of all the integer objects

     System.out.println("Sum of all the numbers: " + sum);  } } //displays the sum of all the numbers

Explanation:

The program prompts the user to enter a series separated by commas.

Then split() method is used to split or break the series of numbers which are in String form, into sub strings based on comma (,) . This means the series is split into separate numbers. These are stored in numbers[] array.

Next the for loop iterate through each sub string i.e. each number of the series, converts each String type decimal number to integer using Integer.parseInt and computes the sum of all these integers. The last print statement displays the sum of all numbers in series.  

If the input is 7,9,10,2,18,6

Then the output is: 7+9+10+2+18+6

sum = 52

The program and its output is attached.

#Recall that input from a user is always in the form of a string. #Write a function called "input_type" that gets user input and #determines what kind of string the user entered. The user input #will be supplied as an argument to the function like normal. # # - Your function should return "integer" if the string only # contains characters 0-9. # - Your function should return "float" if the string only # contains the numbers 0-9 and at most one period. # - You should return "boolean" if the user enters "True" or # "False". # - Otherwise, you should return "string". #Write your function here!

Answers

Answer:

Here is the Python program:

def input_type(input_string): #function that takes a string as input and returns the type of that string

   try:   #used to test a block of code for input string type              

       if type(eval(input_string)) == float: #if the type of the string is float

           return "float" #function returns float

       elif type(eval(input_string)) == int: #else if the type of the string is int

           return "integer"#function return integers

       elif type(eval(input_string)) == bool:#else if the type of the string is bool

           return "boolean" #function return boolean

   except: #if the type of the string is neither int, bool nor float

       return "string" #function return boolean

#following statements are used to  test the working of the above function

print(input_type(" ")) #prints string

print (input_type ("False")) #prints boolean

print (input_type ("7.432621")) #prints  float

print (input_type("2788"))#prints int

Explanation:

The function input_type() takes a user input and returns the type of that string input the user entered. The user input can be one of the following types:

int which is the data type of an integer for example 1, 2, 3 etc

float which is the data type of a floating point number for example 1.2, 3.4 etc

bool which is the data type of a boolean for example True or False

string that can be characters for example an empty space character " "

try block here is used to generate an exception and it is used to test a block in the code that checks for the type of the user input. The except block here is used to handle that error. This is executed when the try part raises an error.

Inside the try block, the if and elif statements check the type of the string.

if type(eval(input_string)) == float: statement checks if the type of the string is float. Here the eval() method is used to convert the input string because the user input is basically a string value. So this method evaluates the input_string.

type() method is used to return the type of that evaluated user input string. If condition checks if type(eval(input_string)) which is the type of the evaluated input string is equal to float. If this condition evaluates to true then the function returns "float" otherwise it moves to the next elif statement. Similarly the type of the user input is checked for int in elif part and if both these if and elif conditions evaluate to false then the next elif statement is executed that checks the user input to be bool. If all these three if elif statements evaluate to false then the except part executes which returns "string". The program along with its output is attached in a screenshot.    

A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively if $n$ is a multiple of $d$. For example, the proper divisors of 12 are 1, 2, 3, 4, and 6, but not 12. A positive integer $n$ is called double-perfect if the sum of its proper divisors equals $2n$. For example, 120 is double-perfect (and in fact is the smallest double-perfect number) because its proper divisors are 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 24, 30, 40, and 60, and their sum is 240, which is twice 120. There is only one other 3-digit double-perfect number. Write a Python program to find it, and enter the number as your answer below.

Answers

Answer:

The program written in Python is as follows:

See Explanation section for line by line explanation

for n in range(100,1000):

     isum = 0

     for d in range(1,n):

           if n%d == 0:

                 isum += d

     if isum == n * 2:

           print(n)

Explanation:

The program only considers 3 digit numbers. hence the range of n is from 100 to 999

for n in range(100,1000):

This line initializes sum to 0

     isum = 0

This line is an iteration that stands as the divisor

     for d in range(1,n):

This line checks if a number, d can evenly divide n

           if n%d == 0:

If yes, the sum is updated

                 isum += d

This line checks if the current number n is a double-perfect number

     if isum == n * 2:

If yes, n is printed

           print(n)

When the program is run, the displayed output is 120 and 672

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.

Explanation:

Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;

1. It allows for multi-users communication instead of point-to-point channel capacity.

2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.

3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?

A. Unicast address
​B. IPV6
​C. DHCP6
D. APIPA

Answers

Answer: APIPA

Explanation:

Automatic Private IP Addressing (APIPA) is a Windows based operating systems feature that allows a computer to assign itself automatically to an IP address even though there is DHCP server to perform the function.

From the information that has been provided in the question, we can see that the type of address that is used is APIPA.

Which option should you choose to review detailed markups within a document

Answers

Answer:

Tracking and Review features.

Explanation:

Tracking and Review are used to show detailed Markup when reviewing a document to make some changes to it.

To reveal detailed Markup, select REVIEW, then select VIEW OPTION from the Review list.

A Simple Markup shows a red line to where changes have already been made.

All Markup shows different person's edits in different colors of texts.

Other Questions
ASAP PLS!!!!!!!!!!!!Which statement best explains why John Deans testimony was so important during the Watergate investigations? Dean was a member of CREEP and created the plan to reelect Nixon. Dean was a lawyer who could clearly describe how the Nixon administration broke the law. Dean was able to testify to dozens of conversations with Nixon about the break-in and cover-up. Dean was not involved in the Watergate break-in, so he was able to have an impartial perspective. Ms. Coulter was successful using a token reinforcement system with Jordan to decrease his inappropriate behaviors in her class. Mr. Johnson is now going to implement the same token system in his class in hopes that Jordan's behavior will improve. This is an example of what generalization technique? Group of answer choices Which one does not describe the ways that players associations support players? A. Providing them with guidance in salary and labor arbitration. B. Providing them with equipment and instruction to enable them to perform at the highest possible level. C. Providing them with salary and contract data. D. Providing them with information to support negotiations. Which statement illustrates the use of paradox in Death be Not Proud? * Death, thou shalt die. And soonest our best men with thee do go, Rest of their bones, and souls delivery. The buyers purchased a residence for $195,000. They made a down payment of $25,000 and agreed to assume the seller's existing mortgage, which had a current balance of $123,000. The buyers financed the remaining $47,000 of the purchase price by executing a mortgage and note to the seller. This type of loan, by which the seller becomes a mortgagee, is called a A player has 15 hits in 34 times at bat and then getsanother hit. Did the batting average increase? Explain. A student noted the following information that will be included in a works cited page for a book. Author: Connie Ling Book: Sea Turtles Location: School library Publisher: Relief House City of Publication: Miami What additional information is needed to cite this source using MLA format Find the product of all real values of $r$ for which $\frac{1}{2x}=\frac{r-x}{7}$ has exactly one real solution. Match each action with the unfair business practice it represents. Can someone please explain this to me? I dont understand it at all. For a free lunch giveaway, a restaurant draws 1 card from a bowl of business cards. Val puts in 5 cards. The bowl has 50 cards. What is the probability that Val will win? The Middle Latitudes have: Lori works as a cartoonist for a teen magazine. The time she spends sketching is given by the equation m = 12s, where m is the number of minutes and s is the number of sketches.If Lori made of a sketch, she spent minutes sketching. You work in the special effects department of a movie studio. You arecurrently working on a superhero movie where the hero is very strongand can punch through metal. For the next scene you need to replace a6 inch by 6 inch square of a metal wall with a different material that willcrumble when the actor hits it. What could you use?A. You could use Carbon(C)B. You could use Potassium (k)C. You could use Titanium (T)D. You could use Manganese (Mn) a body weighs 100newtons when submerged in water. calculate the upthrust action on the body help plz anyone :( will mark p(a) = 0.60, p(b) = 0.20, and p(a and b) = 0.15 what is p(a or b) choices: A. 0.12, B. 0.65, C. 0.40, or D. 0.80 (Note- This is on AP3X) whats the factored form of 6x 2 - 8x - 8 = 0 SHOW ADEQUATE WORKINGS IN THIS SECTION12. Wale and Lekan of 55kg and 60kg respectively ran a race of 200m. i. Calculate their work done in KJii. If wale finished the race in 25secs while Lekan finished in 30secs, calculate their power and who is more powerful out of these two. ( g = 10m/secs)13. A machine has a velocity ratio of 5 and is 800/0 efficient. If the machine is carrying a load of 200kg, what will be effort applied?Please help me answer anyone that you understand at the rate of 50 mph a car can travel 14.6 miles for each gallon of gas used. On a trip Mr. Hanson used 12.5 gallons of gas traveling at a speed of 50 mph. the number of miles covered during the trip was: