What is the default view in a Word document?
Copy View
Editing View
Paste View
Reading View

Answers

Answer 1

Answer:

Editing

Explanation:

I accidentaly clicked "comment" instead of answer.... :')

Answer 2
The default view in a word document is Editing View

Related Questions

How would you define the rule of thirds?
The rule of thirds is an important feature of
. This rule suggests that you must
This is where you should place the
portions of text or an image.

Answers

C ‘this is where you should place the

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

HOW DO I DRAW A HOUSE ON GOOGLE DRAWINGS!!!!!

Answers

Triangle, Square under it, 2 tiny squares with pluses in the middle and a rectangle inside
True but use a picture and copy it

:(.

..
.

.
.
.
.
..

.
.
.
.
.
.
.
.
.
.
.
.
.
.

:(........................

Answers

Answer:

Um what?

Explanation:

Chile anyways so-

As a student how can i stop Goguardian from seeing my screen or know when teacher are looking at my screen

Answers

Answer:

what-

Explanation:

Just simply hide your phone or put on low brightness

Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST

Answers

send it through the mail

Answer:  Be prepared to provide the following information:

1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)

2.Name of restaurant

3.Location/address of the restaurant

4.Date of incident

5.Nature of complaint

If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.

Explanation

unscramble dki-----------------------------------------------------------------------...........

Answers

Answer:

hmmmm.. kid?

Explanation:

Answer:

kid

Explanation:

when thinking of laptops, which brands come to mind?

Answers

Answer:

apple and chrome brands come to mind

Aleinware. It looks mad. But my mac looks nice asweel.

next one wasssss: search :) and go to images

it scared meeeee

next one wasssss: search :) and go to imagesit scared meeeee

Answers

Answer:

not creepy at all..........

Explanation:

Answer:

lol

Explanation:

Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?

Answers

Answer:

I think they should show one subject per month so students are more prepared

Answer: some changes that should be made are  dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .

Explanation:

Dr. Kim divides a programming class into groups. Each group will create a large program as their
final exam. To make this big project more manageable, which of these should the group use?
an algorithm creator
a binary translator
a text editor
top-down programming

Answers

an algorithm creator
An algorithm creator

Using the Adjust group, what can you control to affect an image? Check all that apply.
saturation
tone
sharpness
page breaks
compression
brightness
margins

Answers

Answer:

brightness tone compression sharpness

Explanation:

Using the Adjust group, we can control Saturation, tone, sharpness and brightness to affect an image.

Saturation refers to the intensity or purity of colors in an image. Adjusting the saturation allows you to make the colors more vibrant or muted.

Tone adjustments typically involve modifying the overall lightness or darkness of an image. It helps to balance the distribution of tones, such as adjusting shadows, midtones, and highlights.

Sharpness refers to the clarity and level of detail in an image. By adjusting the sharpness, you can enhance or reduce the level of detail to make the image appear sharper or softer.

Brightness controls the overall luminance or brightness level of an image. Increasing brightness makes the image brighter, while decreasing it makes the image darker.

To learn more on Image adjustments click:

https://brainly.com/question/33435568

#SPJ2

Today you will be researching three forms of technology.

1. Look up current happenings dealing with the following forms of technology: medical technology, construction technology and communication technology.

2. Read articles of current developments in each field of technology.

3. Write a (summary) of what you read/watch including what the technological development is, what it does, are there any trade offs (things given up for the development of that technology) and if you think, given the trade offs, the technology is worth any negative trade offs.

4. For the opinion part of your synopsis, back up your opinion with facts from the
article/video.

5. You must cite your sources (name of the article or video and what website it came from).

6. Write your (summary)

7. Remember to write in complete sentences

Answers

Answer:

why

Explanation:

public class Main {

public static void main(String[] args) {

String firstName = "John ";

String lastName = "Doe";

String fullName = firstName + lastName;

System.out.println(fullName);

}

}

From this example copy and paste code that when run would say your name. in javascript with my first name being Ryan and my last name being Smith

Answers

Answer:

const firstName = "Ryan ";

const lastName = "Smith";

const fullName = firstName + lastName;

console.log(fullName);

Explanation:

public class Main {

public static void main(String[] args) {

String firstName = "Ryan";

String lastName = "Smith";

String fullName = firstName + lastName;

System.out.println(fullName);

}

Explain how Icd 10 cm codes can help identify a patient’s health conditions?

Answers

The ICD-10-CM (International Classification of Diseases, Tenth Revision, Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

Brent is an engineer who works in a nuclear plant. His job is to design the systems that help create nuclear energy and the systems that keep the plant safe. STEM pathway that John's job falls into is ____.
a) teaching and Training
b) Science and Mathematics
c) information support and services
d) Engineering and Technology
Which one? If you know the answer and tell me, I'll mark you Brainliest! Thank you!

Answers

Answer:

it is b

Explanation:

It is d. Because to engineer a power plant you need advanced technology

How do you code things to make shapes out of them and add color

Answers

Answer:

go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?

A.
Creative Commons

B.
word processing program

C.
Weebly

D.
web-based publishing software

Answers

The BEST type of program for Anthony to use to create the items he needs for his business are  word processing program.

What is the word processing program?

Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.

To learn more about  word processing program.

https://brainly.com/question/14718387

#SPJ1

Software program to creat edit and other things of that matter

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?

a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.

Answers

Answer:

a

Explanation:

sis is gonna get scammed

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

many electronic devices use a (?), which contains all the circuit parts in a miniature form.

Answers

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material.

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)

Explanation:

Hope it helps

How might the interconnectedness of the world today change the way we view human rights issues?

Answers

Answer:

The interconnectedness of the world today has the potential to change the way we view human rights issues in several ways:

1. Increased awareness: The internet, social media, and other forms of technology have made it easier for people around the world to learn about human rights abuses and violations. We can now follow news and events in real-time and connect with people from different parts of the world to share information and opinions. This increased awareness can put pressure on governments and organizations to address human rights abuses and hold perpetrators accountable.

2. Greater accountability: The interconnectedness of the world also means that it is easier to hold individuals and organizations accountable for human rights abuses. With the use of technology, it is easier to document abuses and gather evidence, making it more difficult for perpetrators to deny or conceal their actions.

3. Global cooperation: The interconnectedness of the world can foster greater global cooperation on human rights issues. Countries, organizations, and individuals can work together to address human rights abuses and violations, regardless of geographic location.

4. Greater emphasis on universal values: The interconnectedness of the world can lead to a greater emphasis on universal values, such as human dignity and equality. As people from different parts of the world connect and share information, they may come to recognize the importance of these values in promoting peace and justice for all.

5. New challenges: While the interconnectedness of the world offers many opportunities to promote human rights, it also presents new challenges. For example, the rise of cybercrime and cyber warfare can threaten privacy and freedom of expression, which are essential components of human rights.

Overall, the interconnectedness of the world today has the potential to change the way we view human rights issues by increasing awareness, promoting greater accountability and global cooperation, emphasizing universal values, and presenting new challenges.

The inter connectedness of the world today has the potential to change the way we view human rights issues in several ways such as increased awareness, Greater accountability and Global cooperation.

What are the main objects that helps to increase the awareness among people?

The internet, social media, and other forms of technology have made it easier for people around the world to learn about human rights abuses and violations. We can now follow news and events in real-time and connect with people from different parts of the world to share information and opinions.

This increased awareness can put pressure on governments and organizations to address human rights abuses and hold perpetrators accountable. The inter connectedness of the world also means that it is easier to hold individuals and organizations accountable for human rights abuses.

With the use of technology, it is easier to document abuses and gather evidence, making it more difficult for perpetrators to deny or conceal their actions. Greater emphasis on universal values: The interconnectedness of the world can lead to a greater emphasis on universal values, such as human dignity and equality.

Therefore,  e view human rights issues in several ways such as increased awareness, Greater accountability and Global cooperation.

Learn more about awareness on:

https://brainly.com/question/10704836

#SPJ2

create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.

Answers

1. Report post
2. Block or unfollow user
3. Tell parent

Answer:

Report. Block. Tell mommy or dada

Explanation:

A bicycle is probably not a computer because it does not

have a screen
require electricity
use information to solve a problem
use the internet


Pls anwser quick

Answers

use info to solve a problem
use information to solve a problem

What are all the names of different Mechanical Watch, Sundial Watch, Pocket Watch,Digital Watch, Electric Watch, Smart Watch and the Computer? What im trying to say is different type of watches that are above for example different type of tyota cars camry, century and etc

Answers

Answer:

mechanical watch: Grand Seiko T0 Constant-Force Tourbillon caliber

sundial watch: police

pocket watch: tissot savonnette pocket watch

digital watch: casio g shock ga100

electric watch: timex m40

smart watch: apple watch 7

computer: mac book air 2021

Explanation:

mark me brainliest if it helped

Mechanical watches: Omega Speedmaster, Rolex Submariner

Sundial watches: ‍♀️

Pocket watches: Bulova, Tissot, Longines

Digital watch: Bran prestige, Timex expedition WS4

Electric watch: ☝️

Smart watch: apple?

Computer: Mac Book, Windows 10

what word means an unexpected event that has undesirable results.

Answers

Answer:

An accident is an unexpected event that has undesirable results

Answer:

An accident????

CALLING ALL COMPUTER SCIENCE LOVERS!!!!!!!
Can somebody please help me write a code that has the following requirements? If you cannot answer comment your code. TTHHHHHHHHAAAANNNNNNNNNK YOOOOOOOOOUU!!!!!!!!!!!!!!!!!!

Tracy will draw a picture using python.
(IT MUST BE CREATIVE)

1. for loops (at least 1)

2. Descriptive comments

3. variables (at least 2)

4. function (at least 1)

5. parameter (at least 1)

6. if or if/else (at least 1)

7. user input ( optional) ( + 2 bonus points)

Answers

Answer:

# Instead of repeating code over and over

forward(10)

left(90)

forward(10)

left(90)

forward(10)

left(90)

forward(10)

left(90)

# Use a for loop to repeat the code!

for i in range(4):

   forward(10)

   left(90)

# You can use the i variable inside the loop

# i starts at 0, and goes up to COUNT-1

# This will make Tracy move forward 0, then 1, then 2

for i in range(3):

   forward(i)

# You can change the value of i inside a for loop by using mathematical expressions

for i in range(3):

   forward(i*10)

# You can also control the value of i by using extended parameters

for i in range(STARTING_VALUE, ENDING_VALUE, INCREMENT):

# This will move Tracy forward 25, 50, and 75 pixels

for i in range(25, 76, 25):

   forward(i)

love you guys <3

So you know while u are giving code for ur mail or anything else they say u to give. Captial letter small letter and put number so u just give like that only
Other Questions
I NEED HELP ASAP Ill give Brainliest ,THANK YOU Which statement about y = x ^ 2 + 7x - 30 is true? What does the expression kg CO2-eq signify and what do we callthe factor one needs to know to use this expression for anygreenhouse gas? On the other hand, what is meant by CO2factor? Can anyone do 1-7 or some of them I will do brainless if all good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated. Mr. X invet $1,000 at a 10 percent nominal rate for one year. If the inflation rate i 4 percent, what i the real value of the invetment at the end of one year? Most countries in the world have laws governing email content.Give three examples of these laws. Primary endosymbiosis led to the origin of some chloroplasts. This process occurred when a __________ engulfed a _____________. "in many respects, the reality of mass incarceration is easier to avoid knowing than the injustices and sufferings associated with slavery or jim crow." Why did many Americans, including Jackson, believe that Native Americans needed to be removed from their lands which type of government gets reserved power.State governments or federal governments There are two future states and two securities with the associated payments matrix (states x securities) Q=([8,2],[2,8]) The first security current arbitrage-free price is 2.7 and the second security current arbitrage-free price is 6.2. Compute the discount factor (round your answer to 2 decimal points if necessary). Hint the calculations do not require matrix inverse Suppose there are two periods: current and future, and three possible states in the future period, Good (G), Fair (F) and Bad (B). Three major financial instruments. T-bill, the Nasdaq index fund, and the Dow Jones index fund, are available on the market. They have the following payoffs in each state. The current arbitroge free-price of T-bill is 9 and the following information about the arbitrage-free atomic prices is known: PG = 0.23, PB=0.36 Compute the atomic price of the Fair state. Enter your answer using 2 decimal points. Risk-neutral probabilities are always Select one: negative equal to atomic prices equal to physical probabilities equal to forward atomic prices less than physical probabilities *DIFFICULT QUESTION, PLEASE ANSWER* Which of the following is NOT a biased event? a.) The probability of a florist selling roses on Valentines Day b.) The probability of seeing a fireworks show on Independence Day c.) The probability of getting heads when flipping a coin d.) The probability of a college graduate earning more money than a high school graduate the official unemployment rate is not an accurate indicator of actual unemployment in the economy because Use the Distributive Property to rewrite each expression.4 (h - 5g) Write an equation of the line that passes through the given points (-6,2) (1,0) Which dynasty helped Silla defeat its rival kingdoms? During a charity walk, lunch was served from 12:00 PM until 2:10 PM. How long was lunch served? How do authors use figurative language to help them write an engaging fiction? Need help with number 38/t; t = 4 which of the following is the most demanding social responsibility? multiple choice a business should prevent harm even in those cases where it is not the cause. a business should volunteer for society or environment-friendly work. a business should engage in charitable work for the development of the society. a business should not sell a product that causes harm to consumers.