you have a microsoft 365 subscription. all computers are enrolled in microsoft intune enterprise mobility security (ems). you have business requirements for securing your windows 10 devices. you need to lock any device that has a high windows defender advanced threat protection (atp) risk score. which device configuration profile type should you use to accomplish this task?

Answers

Answer 1

To lock a device that has a Windows Defender Advanced Threat Protection (ATP) risk score using Microsoft Intune, you can use the Compliance Policy device configuration profile type.

To create a Compliance Policy profile in Microsoft Intune:

Sign in to the Microsoft Endpoint Manager admin center.

Go to Devices > Configuration profiles > Create profile.

Select Windows 10 and later as the platform.

Select Compliance Policy as the profile type.

In the Settings section, click Add to add a new setting.

Select Windows Defender ATP > Require ATP security risk level to be above a certain level > Configure.

Set the required ATP security risk level and choose whether to block or allow access to the device based on the risk level.

Click OK to save the setting.

Click Create to save the Compliance Policy profile.

Assign the Compliance Policy profile to the relevant group of devices through the Assignments tab.

This will enforce the specified security risk level for the devices and lock any device that has a risk score above the specified level.

To learn more about Windows Defender, visit: https://brainly.com/question/29352945

#SPJ4


Related Questions

helppp meeeeeeeeeeeeeee

helppp meeeeeeeeeeeeeee
helppp meeeeeeeeeeeeeee

Answers

Answer:

A

Explanation:

this is the god i think they worship

true or false A software license is a legal agreement but it does not control the use and distribution of software.

Answers

A software license is a legal agreement but it does not control the use and distribution of software is True.

They are some of the exclusive rights that the copyright owner has, or the rights that come with copyright ownership. A permission is granted by a license.

What is licensed software?On the other hand, licensed software is exclusive software that is only made available to authorized users through a licensing agreement. As the source code is not intended to be shared with the public for anyone to view or alter, it is the exact opposite of open source.Shareware software is offered for free or at a cheap cost, but in order to use it fully legally, it usually needs to be purchased and registered.Free software that has minimal license and copyright restrictions is known as proprietary software. The distribution disc's most popular apps and files are copied to your computer's hard drive during a custom installation.

To learn more about licensed software refer to:

https://brainly.com/question/29106760

#SPJ1

which is true about arrays and methods?a.arrays cannot be passed to methodsb.passing an array to a method creates a copy of the array within the methodc.an array is passed to a method as a referenced.a programmer must make a copy of an array before passing the array to a method

Answers

The correct statement is an array is passed to a method as a reference. The correct option is C.

In a programming language like Java, the real array is not replicated when it is supplied to a method. Instead, the method receives a reference to the array.

As a result, any modifications made to the array inside the function will also affect the original array outside the method. This is so because the array's storage location in memory is the same location where the reference points.

It is efficient to pass arrays as references because it prevents irrational memory usage and enables changes to be performed directly to the original array.

Thus, the correct option is C.

For more details regarding array, visit:

https://brainly.com/question/13261246

#SPJ4

define social media and give examples of social media platforms

Answers

Answer:

Social media is interactive digitally-mediated technologies that facilitate the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks. 

Answer:

On social media platforms, users can share information, ideas, and personal messages. Some examples of social media platforms are Face book, twit ter, snap ch at, and (my favorite) Insta gram.

Explanation:

Hope it helped!

I only put one answer and didn’t specify what it answered

Answers

Okay, so.....cool, yeah

in his image untitled (square head with three eyes), keith haring creates a bold and dynamic effect by using

Answers

In this image "Untitled (Square Head with Three Eyes)" by Keith Haring, he creates a bold and dynamic effect by using vibrant colors and energetic lines.

Keith Haring was known for his use of vibrant and bold colors in his artwork, and this image is no exception. The use of vibrant colors helps to create a visually striking and attention-grabbing composition. Additionally, Haring employs energetic lines and fluid brushstrokes to convey movement and a sense of liveliness in the artwork. These elements contribute to the overall dynamic effect of the image, capturing the viewer's attention and creating a visually engaging experience.

You can learn more about Keith Haring at

https://brainly.com/question/2902367

#SPJ11

the only software component that’s required to run a web application on a client is

Answers

The only software component that’s required to run a web application on a client is a web browser.

A web application is a program or software that runs on a web server and is used by clients over the internet. Web applications are designed to be compatible with multiple platforms, including smartphones, tablets, and computers.

Because they are platform-independent, web applications can be run on a variety of devices without requiring specialized software.

A web browser is a program that displays web pages and content on the internet. It is a client-side software that is installed on a computer or mobile device and is used to access web applications and websites. It provides users with a graphical interface to access web-based content, such as text, images, videos, and multimedia.

Web browsers use HTTP (Hypertext Transfer Protocol) to request and transmit data to and from web servers. Web applications are accessed using web browsers. A web browser is the only software component that’s required to run a web application on a client.

It acts as a user interface that communicates with the web server where the application is hosted. When a user accesses a web application, the web browser sends a request to the web server to retrieve the necessary data and displays the results on the user’s device.

To learn more about software: https://brainly.com/question/28224061

#SPJ11

Which of the following are advantages of using WYSIWYG? Check all of the boxes that apply.

You can focus on content.

You can find and debug problems in the code.

You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Answers

Drag the items to the desired positions to alter the layout of a page. 3. Instead of looking for and putting content within HTML elements or utilising a complicated content management system, you can modify content (text or photos) in a WYSIWYG editor.

What are some instances of WYSIWYG?WYSIWYG, or "what you see is what you get," is a sort of editing software that enables users to view and modify information in a format that resembles how it would be presented on an interface, website, slide presentation, or printed document. For instance, a word processor uses the WYSIWYG idea when you write a document on it. When you print or send a document as a PDF, exactly the same information that you type into it will have been edited and formatted (ie. what you created on screen, you get). WYSIWYG (What-You-See-Is-What-You-Get) and manual coding are the two most popular ways to create HTML texts.

To learn more about WYSIWYG, refer to:

https://brainly.com/question/23272442

Answer: ACD-You can focus on content. You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Explanation:

which tools are used explicitly to monitor and diagnose problems with dns?

Answers

The tools that are used explicitly to monitor and diagnose problems with DNS include tools such as nslookup, dig, and traceroute. These tools allow you to query DNS servers, retrieve DNS records, and trace the path that a DNS request takes, helping you diagnose any issues that may be present in the DNS system.

Nslookup is a commonly used tool that allows you to query DNS servers to obtain information about domain names, IP addresses, and other DNS records.

Dig is another tool similar to nslookup but offers more advanced features and can be used to diagnose more complex DNS issues.

Traceroute is a tool that helps trace the path that a DNS request takes from your computer to the DNS server, aiding in identifying any network or routing issues.

Tcpdump and Wireshark are packet capture tools that allow you to capture and analyze network traffic, including DNS requests and responses, providing insights into DNS server performance and potential problems.

DNS Benchmark is a tool that can be used to compare the performance of different DNS servers, helping in identifying the most efficient and reliable ones for your network.

Learn more about DNS :

https://brainly.com/question/31932291

#SPJ11

2. INFERENCE (a) The tabular version of Bayes theorem: You are listening to the statistics podcasts of two groups. Let us call them group Cool og group Clever. i. Prior: Let prior probabilities be proportional to the number of podcasts each group has made. Cool made 7 podcasts, Clever made 4. What are the respective prior probabilities? ii. In both groups they draw lots to decide which group member should do the podcast intro. Cool consists of 4 boys and 2 girls, whereas Clever has 2 boys and 4 girls. The podcast you are listening to is introduced by a girl. Update the probabilities for which of the groups you are currently listening to. iii. Group Cool does a toast to statistics within 5 minutes after the intro, on 70% of their podcasts. Group Clever doesn't toast. What is the probability that they will be toasting to statistics within the first 5 minutes of the podcast you are currently listening to? Digits in your answer Unless otherwise specified, give your answers with 4 digits. This means xyzw, xy.zw, x.yzw, 0.xyzw, 0.0xyzw, 0.00xyzw, etc. You will not get a point deduction for using more digits than indicated. If w=0, zw=00, or yzw = 000, then the zeroes may be dropped, ex: 0.1040 is 0.104, and 9.000 is 9. Use all available digits without rounding for intermediate calculations. Diagrams Diagrams may be drawn both by hand and by suitable software. What matters is that the diagram is clear and unambiguous. R/MatLab/Wolfram: Feel free to utilize these software packages. The end product shall nonetheless be neat and tidy and not a printout of program code. Intermediate values must also be made visible. Code + final answer is not sufficient. Colours Use of colours is permitted if the colours are visible on the finished product, and is recommended if it clarifies the contents.

Answers

(i) Prior probabilities: The respective prior probabilities can be calculated by dividing the number of podcasts made by each group by the total number of podcasts made.

(ii) Updating probabilities based on the gender of the podcast intro: Since the podcast intro is done by a girl, we need to calculate the conditional probabilities of the group given that the intro is done by a girl.

(iii) Probability of toasting to statistics within the first 5 minutes: Since Group Cool toasts on 70% of their podcasts and Group Clever doesn't toast, we can directly use the conditional probabilities.

Group Cool: 7 podcasts

Group Clever: 4 podcasts

Total podcasts: 7 + 4 = 11

Prior probability of Group Cool: 7/11 ≈ 0.6364 (rounded to four decimal places)

Prior probability of Group Clever: 4/11 ≈ 0.3636 (rounded to four decimal places)

(ii) Updating probabilities based on the gender of the podcast intro: Since the podcast intro is done by a girl, we need to calculate the conditional probabilities of the group given that the intro is done by a girl.

Group Cool: 4 girls out of 6 members

Group Clever: 4 girls out of 6 members

Conditional probability of Group Cool given a girl intro: P(Group Cool | Girl intro) = (4/6) * 0.6364 ≈ 0.4242 (rounded to four decimal places)

Conditional probability of Group Clever given a girl intro: P(Group Clever | Girl intro) = (4/6) * 0.3636 ≈ 0.2424 (rounded to four decimal places)

(iii) Probability of toasting to statistics within the first 5 minutes: Since Group Cool toasts on 70% of their podcasts and Group Clever doesn't toast, we can directly use the conditional probabilities.

Probability of toasting within the first 5 minutes given Group Cool: P(Toasting | Group Cool) = 0.70

Probability of toasting within the first 5 minutes given Group Clever: P(Toasting | Group Clever) = 0

The overall probability of toasting within the first 5 minutes of the podcast you are currently listening to can be calculated using the updated probabilities from step (ii):

P(Toasting) = P(Toasting | Group Cool) * P(Group Cool | Girl intro) + P(Toasting | Group Clever) * P(Group Clever | Girl intro)

           = 0.70 * 0.4242 + 0 * 0.2424

           ≈ 0.2969 (rounded to four decimal places)

The prior probabilities of Group Cool and Group Clever were calculated based on the number of podcasts each group made. Then, the probabilities were updated based on the gender of the podcast intro. Finally, the probability of toasting to statistics within the first 5 minutes of the current podcast was estimated using the conditional probabilities.

To know more about Prior Probabilities, visit

https://brainly.com/question/29381779

#SPJ11

what is amoeba cell do? max amount of points so pls answer​

Answers

Answer:

Ameoba is an organism which is unicellular and is a free-living cell. it is also a eukaryotic organism ( it has well-defined, membrane-bound cell organelles).

An amoeba cell has to carry out all the functions needed for its survival such as injection of food, digestion of food, excretion of waste, etc

An Amoeba cell is a unicellular organism. It is eukaryotic and has well-defined, membrane-bound cell organelles. Amoebas function as their own living body, so they create energy, move around, and throw out waste on their own.

Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours to activities related to the job. Which quality is he looking for? A. responsibility B. flexibility C. trust D. reliability E. integrity

Answers

Answer:

reliabitlity

Explanation:

the incidence of cholelithiasis and symptomatic gallstones after laparoscopic sleeve gastrectomy was 47.9% and 22.9% respectively

Answers

According to the given information, the incidence of cholelithiasis (the formation of gallstones) after laparoscopic sleeve gastrectomy is 47.9%. This means that nearly half of the patients who undergo this weight loss surgery develop gallstones. Additionally, the incidence of symptomatic gallstones, which cause symptoms and require treatment, is 22.9%.

To break it down:
- Out of 100 patients who undergo laparoscopic sleeve gastrectomy, approximately 48 of them will develop gallstones.
- Out of those 48 patients, around 23 will experience symptoms and require treatment for their gallstones.

It's important to note that this data is specific to laparoscopic sleeve gastrectomy and may vary for other types of weight loss surgeries. Gallstone formation is a potential complication of this procedure, and patients should be aware of the risk and discuss it with their healthcare provider.

To know more about laparoscopic visit:

https://brainly.com/question/26494838

#SPJ11

It is the job of the ____ to enable reliable transmission of data through the physical layer at the sending end. group of answer choices

Answers

Answer:

The statement is true

Explanation:

It is the job of the data link layer to enable reliable transmission of data through the physical layer at the sending end.

What is meant by the data link layer?

The data link layer, or layer 2, is the second tier of the seven-layer OSI model of computer networking. This layer is the protocol layer that transports data between nodes on a network segment by crossing the physical layer.

The data link layer is the protocol layer in a program that manages data transfer into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a collection of communication protocols.

At the data connection layer, data bits are combined into entities known as frames. Network topologies such as Ethernet exist at the data connection layer. The most commonly used network hardware at the data link is a switch.

To learn more about the data link layer refer to:

https://brainly.com/question/13131540

#SPJ4

Suppose you encounter a situation in which a while loop in your program runs without stopping. What could you do to improve the code?

A. Troubleshoot by restarting your computer
B. Switch to a for loop instead
C. Update the conditional statement in the while loop
D. Use try/except statements to catch and handle the exception

Answers

Suppose you encounter a situation in which a while loop in your program runs without stopping. What could you do to improve the codehe correct option is: C.Updating the conditional statement in the while loop.

Suppose you are working with a while loop that is running without stopping, it means that the condition you have set in the while loop is not getting fulfilled. Therefore, updating the conditional statement in the while loop will help in making the loop stop.Instead of restarting your computer or switching to a for loop, you can troubleshoot the issue by checking the conditional statement of the while loop.

This is a better solution and less time-consuming.Updating the conditional statement will make sure that the loop runs for a certain number of times and then stops. It will also help in increasing the efficiency of the program.Using try/except statements to catch and handle the exception is useful when an exception occurs in the program. It is not a solution to this problem. Therefore, the answer is C. Update the conditional statement in the while loop.

Learn more about while loop: https://brainly.com/question/26568485

#SPJ11

What will display on the console as the result of running this code:
console.log("Print In this");
A. Print \n this
B. Print
this
C. Print this
D. Error

Answers

Answer:

"Print In this"

or

b. "Print

this"

Explanation:

None of the options are correct if it is console.log("Print In this");

The reason why is because console.log will simply print "Print In this".

Now, if you mistyped and actually meant to include a backlash in such a way that it is console.log("Print \n this"); the \ means an enter, so it separates "Print" and "this", outputting the following:

"Print

this".

1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?

Answers

Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.

They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.

The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.

During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

Which description of the plain text file format is most accurate? uses binary code to store data can only be opened with special software supports text formatting like bold or italics used by programmers for source code

Answers

The phrase "uses binary code to store data" is the best way to describe the plain text file format.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently used as the two symbols in this system. Each character, instruction, etc. is given a set of binary digits, also referred to as bits, by the binary code.

An eight-bit binary string, for instance, has 256 possible values and can thus represent a wide range of different things. Binary codes are used in computing and telecommunications for a number of different ways to encode data, like character strings, into bit strings. These techniques could make use of fixed-width or flexible strings.

Learn more about binary code https://brainly.com/question/28222245

#SPJ4

Explain why Windows reports 8 GB of memory even though the one SO-DIMM contains 4 GB of memory.
Can the laptop receive a memory upgrade and if so, how much will it cost?

Answers

Due to the laptop's dual-channel memory arrangement, which allows it to use two SO-DIMMs simultaneously, Windows reports 8 GB of memory.

Each SO-DIMM in this instance is delivering 4 GB of memory, making a total of 8 GB available. The OS and the game are considerably more knowledgeable about how the RAM should be maintained and what assets should be moved where than you or I am.

High RAM use is in no way harmful. You don't pay for 8GB to utilize only 2GB, do you? In that case, purchase 2GB instead. Never worry about RAM utilization unless an unknown app is using too much and preventing the use of other system features or capabilities.

Learn more about memory here-

https://brainly.com/question/30273393

#SPJ4

The Internet has made it more difficult for social movements to share their views with the world.

a. True

b. False

Answers

The Internet has made it more difficult for social movements to share their views with the world is false statement.

What is Social movements?

The implementation of or opposition to a change in the social order or values is typically the focus of a loosely organized but tenacious social movement. Social movements, despite their differences in size, are all fundamentally collaborative.

The main types of social movements include reform movements, revolutionary movements, reactionary movements, self-help groups, and religious movements.

Examples include the LGBT rights movement, second-wave feminism, the American civil rights movement, environmental activism, conservation efforts, opposition to mass surveillance, etc.

Therefore, The Internet has made it more difficult for social movements to share their views with the world is false statement.

To learn more about Social movements, refer to the link:

https://brainly.com/question/12881575

#SPJ1

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

To which of these options does the style in Word apply? Select three options.

Answers

More information???

Answer:

lists

tables

headings

Explanation:

________ refers to software designed to alter system files and utilities on a victim's system with the intention of changing the way a system behaves.

Answers

The software that is designed to alter system files and utilities on a victim's system with the intention of changing the way a system behaves is called a rootkit.

A rootkit is a type of malicious software or malware that is used to take unauthorized access to a computer system or network. It is a set of software tools used by attackers to conceal their activity on a victim's computer. This software has a unique ability to hide its presence and activity on a system, making it difficult to detect or remove.

It allows attackers to remotely access and control a system without the user's knowledge or consent. Rootkits can be used to gain administrator-level access to a system, steal sensitive information, modify system files and configurations, and run malicious software in the background.

To know more about software visit:

https://brainly.com/question/32393976

#SPJ11

what is the difference between a local variable and an object’s attribute?

Answers

A local variable is a variable that is defined within a specific function or block of code, and can only be accessed within that scope.

It is temporary and exists only for the duration of that particular function or block of code. On the other hand, an object's attribute is a variable that is associated with an object, and defines a characteristic or property of that object. It exists for the lifetime of the object and can be accessed from anywhere within the code that has access to the object.

In summary, a local variable is limited to a specific function or block of code, while an object's attribute is associated with an object and exists for the lifetime of that object.

Learn more about local variable: https://brainly.com/question/24657796

#SPJ11

Rick is pursuing an undergraduate degree in electronics engineering. He aspires to be a robotics software engineer. Which topic in robotics should Rick be aware of?

Answers

Options:

A.  database programming

B.  Embedded C

C.  testing software

D.  ABET

Answer:

B.  Embedded C

Explanation:

Remember, many robotic systems  make use of embedded systems, and one important programming language used is the C (Embedded C) Programming language.

Hence, since many hardware components can be programmed using C, it would therefore be necessary for Rick to be aware of Embedded C.

alexa it is olewi.............................................

Answers

Answer:

jvksvksdvkbvkjsdkcn

Explanation:

Huh.........whattttt

Which of these lists correctly counts from 1 to 5 In binary

Which of these lists correctly counts from 1 to 5 In binary

Answers

Answer:B

Explanation: it is b because counting to 5 in binary is 0=0 1=1 2=10 3=11 4=100 and 5=101 so when you add the exes zeros  it becomes B.

Activity 1:

Directions: Sort the words from the word bank into the correct box of tools, materials and equipment. Submit your finished work to your teacher in your scheduled day.

Compass Ruler Triangular Scale

French Curve

Drawing Stool

Drawing Table

Protractor

Eraser

T-square

Dusting Brush

Triangle Templates

Technical Pen

Tracing Paper

Drawing Pencil

DRAFTING MATERIALS

Erasing Shield

Masking Tape

Drafting Machine​

Answers

Activity 1 is a sorting activity that requires you to categorize various tools, materials, and equipment used in drafting. This exercise is crucial in helping you to familiarize yourself with the different tools and their uses in the drafting process.

Some of the tools in the word bank include a compass, ruler, triangular scale, French curve, drawing stool, drawing table, protractor, eraser, T-square, dusting brush, triangle templates, technical pen, tracing paper, drafting materials, erasing shield, masking tape, and drafting machine.

Sorting these items into their respective categories of tools, materials, and equipment is necessary to ensure that you can easily access them when needed. As you sort the items, it's essential to consider their functions and the role they play in the drafting process.

Remember to submit your completed work to your teacher on the scheduled day to get feedback and improve your drafting skills. By familiarizing yourself with these drafting tools, you'll be better equipped to create precise, accurate, and high-quality drafts.

You can learn more about drafting at: brainly.com/question/14411004

#SPJ11

Which ICMP message type/code indicates the packet could not arrive at the recipient due to exceeding its time to live?A. Type 11B. Type 3, Code 1C. Type 0D. Type 8

Answers

In the case of a packet that cannot reach its destination due to exceeding its time to live, the ICMP message type/code that is used is Type 11. This type of message is commonly known as a "Time Exceeded" message, and it is used to notify the sender that the packet has been dropped by a router along the way.

The ICMP protocol is responsible for providing feedback to network devices about the status of their communication. When a device sends a packet, it expects to receive an acknowledgement from the recipient indicating that the packet was received successfully. If the packet does not reach the recipient within a certain amount of time, an ICMP message is sent back to the sender indicating the cause of the failure.

Type 11 ICMP messages are sent by routers when a packet's time to live (TTL) value has been exceeded. The TTL is a field in the IP packet header that is used to limit the number of hops a packet can make before it is discarded. When a packet passes through a router, the TTL value is decremented by one. If the TTL value reaches zero before the packet reaches its destination, the router discards the packet and sends a Type 11 ICMP message back to the sender.

In contrast, Type 3, Code 1 ICMP messages indicate that the packet was dropped by the recipient due to an unreachable destination network. Type 0 ICMP messages are Echo Reply messages, and Type 8 ICMP messages are Echo Request messages. Therefore, the correct answer to the question is A) Type 11.

Learn more about router here:

https://brainly.com/question/28273580

#SPJ11

Assume the following rule is the only one that styles the body element:_______.
body{
font-family: Cursive, Helvetica, Verdana;
}
What happens if the browser doesn't support any of these font families?
A. The text will be displayed in the default browser font-family
B. The text will not be displayed
C. The text will be displayed in Cursive

Answers

Answer:

The answer is A, it will substitute those font families for the default font family.

Other Questions
what term is used to describe the lateral extensions of the pia mater that anchor the spinal cord to the vertebral foramen walls ANSWER ASAP"The federal Constitution will be upheld by every legal means at my command," President Eisenhower had told Governor Faubus. The President had sent a telegram to Governor Faubus saying he was sure the governor, the National Guard, and other state officials would give full cooperation to the United States Supreme Court. The President also reassured the governor that rumors of federal authorities waiting to arrest him were untrue. Warriors Dont Cry,Melba Pattillo BealsRead the passage, then answer the questions.Does the passage present mostly factual information, emotional language, or strong opinions?1 factual information2 emotional language3 strong opinionsBased on the details in the passage, what is its primary purpose?1 to entertain2 to persuade3 to inform On the map below, retrace the three Jewish diasporas and name them. For example, what year did they happen, and where did the Jews go? Which of the following compounds is likely to have covalent bonds?A. NaClB. LiBrC. CaOD. CO Which of the following is a nonmanufacturing business where process costing would most likely be used? Group of answer choices A beauty shop. A laboratory that tests water samples for lead A furniture repair shop. An auto body shop. A tailoring shop. A service elevator takes a load of garbage, mass 10.0 kg, from a floor of a skyscraper under construction, down to ground level, accelerating downward at a rate of 1.2 m/s2 . Find the magnitude of the force the garbage exerts on the floor of the service elevator Find the equation of the line.Use exact numbers.y =++ Which phrase signals a cause-and-effect relationship?1.not long after2.this led to3.begin with4.at that point Una oracin con la palabra osado.A sentence with the word osado. why is the created structure for marriage the only appropriate means for fulfilling god's purposes for sex Performers play some instruments in the string family by blowing air using mallets using a pick shaking the instrument y = -3x+4y = 3x+4HELP 2 Question 1(Multiple Choice ) (04.06 MC) Which of the following best explains why a monetary policy cannot help a country remove the inflationary gap in the economy? O A crowding out effect reduces private investment. O An increase in taxes discourages investment in the economy. O An increase in the reserve ratio does not translate to changes in the interest rate quickly. O Buying of securities leads to a decrease in the amount of credit in the economy. O Government spends too much on the unnecessary areas. Find a and b such that f is differentiable everywhere. f(x)={(4 cos(x) text(if ) x < 0,ax b text(if ) x >= 0) 16. Cassandra notices that when she breathes on a cool window, the water vapor in her breath formsliquid water. What happens to turn the water vapor in her breath into liquid water?A. Heat is added to the water vapor from the surrounding air.B. The temperature of the water vapor increases as it leaves her body,C. The water molecules become more spread apart as they touch the window.D. Heat leaves the water vapor as it touches the cool window. Find the distance between the points (-6, -8) and (0, -10). Identified by researchers, which of the following are specific factors identified by the Corporate Entrepreneurship Assessment Instrument (CEAI) that managers in organizations can concentrate on in structuring an entrepreneurial climate?a. radical innovation, incremental innovation, and visionb. skunk works, multiple approaches, and visionc. top management support, time, autonomy, rewards, and organizational boundariesd. rewards, resources, innovation, and vision Did growing corn happen in 1492 in north Americaa. A farmer growing corn in North America graph the function y=-2/x Research on alcohol has shown that the more a person drinks, the worse their motor skills will become, such as walking, coordination, and balance. Dr. Smith decided to test this claim by randomly assigning volunteers to two groups in which people either drank alcohol or not. Ten people drank 6 oz. of vodka in one hour; 10 people drank 6 oz. of water in one hour. Dr. Smith predicted that people in the alcohol group will not be able to balance on one foot for as many seconds as people in the water group.What is the Independent Variable (IV)?What is the Dependent Variable (DV)?Please identify the theory!Please identify the hypothesis!