Advantages of desktop publishing over traditional methods include        A. higher resolution and more space.  
B. fewer mistakes and greater offset.  
C. unified workspace and increased flexibility.  
D. higher cost and more expensive equipment.

I'm pretty sure the answer isn't D; it just doesn't make sense to me.

Answers

Answer 1
Answer: from what my teacher taught us it would be c.

Related Questions

In the Charges section of the Transaction Entry dialog box the Total box is the result of multiplying the number in the ____________ by the number in the Amount box
PLEASE HELP!!!!!!!!!!IT professionals have strict legal and ethical standards because of A. the credentials they hold to perform their job. B. the oath they took when they began their career. C. the pressure put on them to behave a certain way. D. the strategic role they play in an organization.
What is the difference between the (BIOS) basic.input.output.system and R.O.M
Which element is located on the top left of the Word screen?
Differentiate the history of computer concepts to the new era of technology today.

which application guard settings need to be configured so that any non-corporate approved resources can be accessed using application guard?

Answers

To configure Application Guard settings for accessing non-corporate approved resources, you'll need to adjust certain settings in Windows Defender Application Guard (WDAG). WDAG is a security feature.

in Windows 10 that uses virtualization to create a secure, isolated environment for running potentially risky tasks or browsing non-corporate approved websites. To set up WDAG to allow access to non-corporate approved resources, follow these steps:
1. Windows Defender Application Guard: First, make sure WDAG is enabled on your device. You can do this through Group Policy, Intune, or System Center Configuration Manager.
2. Configure network isolation settings: Specify which domains are considered corporate resources by creating a list of allowed domains. This ensures that non-corporate approved resources are opened in an isolated container.
3. Adjust Application Guard policies: Customize policies to meet your organization's requirements, such as allowing clipboard access, printing, and file downloads from the isolated container. This can be done through Group Policy or MDM (Mobile Device Management) tools like Intune.
4. Configure Application Guard for Microsoft Edge: Configure Edge settings to launch WDAG automatically when browsing non-corporate approved websites. This can be done through Edge's Group Policy settings or MDM tools.
By configuring these settings, you'll create a secure environment that allows access to non-corporate approved resources while minimizing the risk of potential threats.

Delegation of credentials for RDP connections via GPO is possible. Windows by default enables the user to save her RDP connection's password. To accomplish this, the user must open the Remote Desktop Connection (mstsc.exe) client window, input the RDP machine name and user name, and check the Allow storing credentials box.

Learn more about Windows Defender Application Guard here

brainly.com/question/30633165

#SPJ11

To select a new theme for a slideshow use the blank tile in the ribbon

Answers

to get a new slide show title just go to PowerPoint and you can find it
Go onto th tab called design, and choose which you want

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A) a trojan B) phishing C) Use a surge protector. d) none of these

Answers

Answer:

A Trojan

Explanation:

Emma has downloaded a Trojan. A Trojan, also referred to as Trojan horse is a type of malware that may look like it is legitimate, but once installed in your computer, it can cause a great havoc by taking control of your computer. It is usually designed to cause damage to a system, or to steal information, or inflict harm to your network or computer.

Based on the scenario described, it is most likely that Emma has downloaded a malware onto her computer called as Trojan. Therefore, the correct option is A.

A Trojan is a type of malware that poses as a trustworthy program or file in order to trick people into downloading and installing it. Once installed, it can perform a number of nefarious tasks including stealing confidential data such as passwords and credit card details. Trojan horse is another name for Trojan. Trojans are so called because they hide their true nature like the famous Trojan Horse.

Therefore, the correct option is A.

Learn more about Trojan, here:

brainly.com/question/9171237

#SPJ6

You are in charge of recycling computers. some of the computers have hard drives that contain personally identifiable information (pii). what should be done to the hard drive before it is recycled?

Answers

Wiped and reformatted.

Of the following statements are applicable to an actor in a use case diagram? Select all the statements which are true. a) An actor represents a user or another system interacting with the system being modeled. b) An actor must be a physical person. c) An actor can initiate and participate in use cases. d) An actor cannot be part of more than one use case.

Answers

Answer:

a) An actor represents a user or another system interacting with the system being modeled.

c) An actor can initiate and participate in use cases.

Explanation:

- Statement A is true because an actor is an entity that performs a role in a particular system. This entity can be a human user, hardware, or another system.

- Statement B is false because an actor does not necessarily have to be a physical person. As mentioned above, it can be a system, a piece of hardware, or even another software system.

- Statement C is true because actors in a use case are the ones who initiate the use case and participate in it.

- Statement D is false because an actor can be part of multiple use cases. It's quite common in systems where a single actor (like a user or another system) interacts with multiple parts of the system.

Hope this helps! :)

Which of the following statements is​ FALSE? A. Security is a huge concern for nearly all organizations with private or proprietary information about​ clients, customers, and employees. B. New controls in​ e-mail programs can ensure that your​ e-mail will remain​ private, both within your​ organization's server and at the​ receiver's end as well. C. When writing​ e-mails, avoid jargon and​ slang, use formal​ titles, use formal​ e-mail addresses for​ yourself, and make your message concise and​ well-written. D. Lack of visual and vocal cues in​ e-mails means emotionally positive​ messages, like those including​ praise, will be seen as more emotionally neutral than the sender intended. E. ​Face-to-face communication provides the highest degree of message channel richness.

Answers

B is false, because once an e-mail is sent, the receiver can do what they wish with the contents of it (for example, screenshotting or taking a picture of it). There is no guarantee of privacy if you do not trust the recipient.