Answers

BM

Answered

If a hacker enters a building with an official-looking ID badge. This is considered social engineering.

On Jul 17, 2024


True
BM

Answered

You adopt a child and need to update your healthcare benefits to include that new child. This is an example of _________ e-commerce.

A) B2B
B) B2C
C) B2E
D) C2C

On Jul 09, 2024


C
BM

Answered

Raina is putting finishing touches on her Ph.D.thesis report.She feels she should emphasize the keywords throughout the thesis.How can she do this in the word processor she is using?

A) Change font size, style, and color of the keywords.
B) Define a heading style.
C) Change page margins, size and orientation.
D) Add hyperlinks for each keyword.

On Jun 12, 2024


A
BM

Answered

Click ____ to move a stacked object toward the top of the stack.

A) Move Forward
B) Bring Forward
C) Send Forward
D) Slide Forward

On Jun 09, 2024


B
BM

Answered

Zach wants to change the size of a rectangle on a slide so that it is wider.How can he do this without changing the height of the rectangle? Select all the options that apply.

A) Drag a corner sizing handle on the rectangle.
B) Drag a sizing handle on the left or the right side of the rectangle.
C) Type a larger value in the Shape Width box on the Drawing Tools Format tab on the ribbon.
D) Click the Change Width button on the Drawing Tools Format tab.

On May 13, 2024


B, C
BM

Answered

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

A) exposure
B) risk
C) threat
D) vulnerability

On May 10, 2024


A