Answer:
Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...
On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.Explanation:
help Which of the following triangles can be proven similar through AA?
Question 1 options:
A)
image
B)
image
This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste
Answer:
Drag or paste (im not 100% sure tho)
Explanation:
You send a friend a private message about something personal that is going on with you. Without permission, she forwards your text to everyone on her contact list.
What would you do? Why?
Answer:
Ask the person to remove the imagePut pressure on the person to remove the message though their peer group and carers.Tell a trusted adult about what is happening and explain the situation, they might have advice tailored to your specific situation.Report it to the social networkIf appropriate then tell the policeExplanation:
Start up a dialogue with the person to find out if they would be willing to take down the message, and find out why they did it as this could prevent a similar situation happening in the future.
Applying pressure though their peer group to conform to your standards is also a good measure to take as they would not want to feel left out.
If any images that you have taken are being shared then you can try to have them taken down under copyright. If personal information was shared then did that breach the laws in your or their jurisdiction?
What is the "thinking work" of the computer? How does it help the computer?
Answer:
El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción
Explanation:
Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.
You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible
Answer:
Explanation:
Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.
The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.
To do this, one must:
Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordinglyCheers
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d