A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:
Hello, Ms. Roye,
I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.
One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.
I would urge you to rethink your use of this version of Oracle
What is a Memo?
This refers to the written message that is usually used in a professional setting to communicate.
Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.
Read more about memo here:
https://brainly.com/question/11736904
#SPJ1
Question 10 of 25
Which three statements describe impacts of computers on the world around
you?
A. Computers control traffic lights and public transportation
systems.
B. Computers are used to order meals from paper menus in
restaurants.
C. Computers allow people to take classes and complete
assignments remotely.
D. Computers are used to track and keep records for health care and
education.
Answer:
A. Computers control traffic lights and public transportation systems.
C. Computers allow people to take classes and complete assignments remotely.
D. Computers are used to track and keep records for health care and education.
Explanation:
Computers have had a significant impact on many aspects of modern life, including transportation, education, and healthcare. They are used to control traffic lights and public transportation systems, which helps to improve efficiency and safety. They are also used to facilitate distance learning and to keep track of important records in the healthcare and education sectors.
Given the sorted numbers 2,8,16,19,24,35,75,88. Insert 20, showing your steps clearly
Answer:
20 goes between 19 and 24 or 2,8,16,19,20,24,35,75,88
Explanation:
1 easy way to do it is see if the number is smaller or greater than 20. So first we have 2 which is the second number so 2 smaller than 20 by 18. Next is 8 so if you count up you will reach 8 first indicating that 8 is smaller than 20 by 12. Now we do the same thing with 16 and 19 if you count up you will reach 16 and 19 before you get to 20. Now you have 24 so you count up but this time you reach 20 first so that indicates that 20 is smaller than 24 so you put 20 between the number 24 since it is the closest larger number to 20 and you also put it next to 19 since it is the closest smaller number to 20. Now we aren't gonna do the numbers after 24 because there already sorted from least to greatest so that means all the numbers after 24 will be greater than 20. So now that we solved the problem the number line should look like this 2,8,16,19,20,24,35,75,88. As you can see 20 is in between 19 and 24.
Brainliest please if you liked the answer.
What options are available under the Form Tools Design tab? Check all that apply.
add controls
change fonts
change views
change margins
add existing fields
insert rows and columns
Answer:
Option A, B, C, E
Explanation:
The form Tools Design tab has following functions
add controls
change fonts
change views
add existing fields
Hence, option A, B, C and E
You are the IT administrator for a small corporate network. You have just changed the SATA hard disk in the workstation in the Executive Office. Now you need to edit the boot order to make it consistent with office standards. In this lab, your task is to configure the system to boot using devices in the following order: Internal HDD. CD/DVD/CD-RW drive. Onboard NIC. USB storage device. Disable booting from the diskette drive.
Answer:
this exercise doesn't make sense since I'm in IT
Explanation:
What does this Python expression evaluate to?
100 != 100
True
False
“True”
“False”
Answer: False
Explanation:
When i use for function the output is ['Banana', 'Orange']; However, when used if function the output is ['Apple', 'Banana', 'Orange']. Why?
foods = ["Apple", "Banana", "Pineapple", "Orange"]
removeFoods = foods[2]
for removeFoods in foods:
foods.remove(removeFoods)
print(foods)
________
foods = ["Apple", "Banana", "Pineapple", "Orange"]
removeFoods = foods[2]
if removeFoods in foods:
foods.remove(removeFoods)
print(foods)
Answer:
Explanation:
The difference in the output is due to the fact that the for loop is iterating over the list foods, while the if statement is only evaluating a single element in the list.
In the for loop, the variable removeFoods is being assigned the value of each element in the list in turn, and the foods.remove(removeFoods) line is being executed for each element. This means that the for loop will iterate over the entire list and remove all the elements except the last one.
In the if statement, the variable removeFoods is only being evaluated once, and the foods.remove(removeFoods) line is only being executed if removeFoods is in the list. Since removeFoods is equal to "Pineapple", and "Pineapple" is not in the list, the if statement does not execute and no elements are removed from the list.
So the difference in the output is due to the different ways that the two blocks of code are interacting with the list.
WORTH 75 POINTS!!
Which best describes the video encoding process?
converting analog video into digital video
filming a video at 30 frames per second
saving a digital video in a specific file format
watching a video while the file downloads
Answer:
To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.
Answer:
Why is compression important for video streaming?
to increase the number of frames per second so that motion appears smooth
to watch video without waiting for it to download(this one)
to improve image quality
to increase file size
Explanation:
carry out the binary arithmetic 10100+1010-1010-1010
Hello !
64 32 16 8 4 2 1
1 0 1 0 0
1 0 1 0
10100 => 20
1010 => 10
20 + 10 - 10 - 10 = 10
binary : 10100 + 1010 - 1010 - 1010 = 1010
With this option enabled on your mobile device you cannot do tasks that require a wireless connection.
Airplane mode
Wireless internet access points enable users with computers & mobile devices to connect to internet wirelessly. (True)
What is Wireless internet?Wireless Internet service providers (WISP) who broadcast wireless Internet signals in a specific geographic area are typically the ones who offer wireless Internet. Satellite signals or radio waves are typically used to deliver wireless Internet.Interdepartmental connectivity can be ensured by setting up a Wireless Local Area Network (WLAN) within the organization.The WLAN allows different devices in the different departments within an organization to communicate and share information without any physical wired connection.Wireless Internet is typically slower than wired Internet connections because it is a communication medium that is dependent on the environment. A wireless Internet modem, wireless access card, or Internet dongle is typically needed by the end user to connect to wireless Internet.Two popular types of wireless Internet are WiMax and EV-Do. Wi-Fi connections inside of a house, office, or local network may also be used to access the Internet wirelessly.To learn more about wireless Internet refer to:
brainly.com/question/26956118
#SPJ4
how do i write a python program for traffic signal with 6sec for each led (red,yellow,green) and a 7 segment display that displays 5,4,3,2,1,0 with the lights in Raspberry GPIO pin format?
do have i to write separate scripts? or can it be done in one itself ?
Sure, you can create a Python programme that activates each LED for six seconds and controls traffic signal while showing the countdown on seven section display. With RPi, it may be completed in a single script.
What shade should a traffic sign be?Red, Yellow, and Green are the three colours used in traffic signals. You must stop when the signal is red, slow down and wait when it is yellow, and go when it is green.
import RPi. GPIO as GPIO
import time
# Define GPIO pins for each LED
red_pin = 17
yellow_pin = 27
green_pin = 22
# Define GPIO pins for 7 segment display
seg_pins = [18, 23, 24, 25, 12, 16, 20]
# Define segment display patterns for each digit
patterns = {
0: [1, 1, 1, 1, 1, 1, 0],
1: [0, 1, 1, 0,
To know more about Python visit:-
https://brainly.com/question/30427047
#SPJ1
You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?
The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.
What is IPAM?IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.
The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.
Learn more about IPAM from
https://brainly.com/question/24930846
what is difference between computer and smartphone
Answer: One is smaller than the other.
FILL IN THE BLANK. a __ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.
A personal area network (PAN) is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.
A personal area network (PAN) is a type of wireless network that provides connectivity between devices in close proximity to each other, typically within a range of 10-meters. PANs are typically used for personal, non-commercial purposes and connect devices such as cell phones, headsets, personal digital assistants (PDAs), game controllers, and other small, portable devices.
PANs typically use low-power, short-range technologies such as Bluetooth, Infrared Data Association (IrDA), or Zigbee to establish connectivity. These technologies allow devices to communicate with each other wirelessly, eliminating the need for cords and cables and making it easier to connect and use the devices.
One of the main benefits of PANs is their simplicity and convenience. They allow you to quickly and easily connect devices in close proximity, eliminating the need for manual configuration or setup. Additionally, they use very low power, making them ideal for use with battery-powered devices.
Overall, PAN are a useful technology for individuals and small groups who need to connect their devices in close proximity for personal, non-commercial purposes.
Learn more about personal area network (PAN) here:
https://brainly.com/question/14704303
#SPJ4
i want to touch it but if i talked about the past , it would be i wanted to touch it or i wanted to touched it?
Answer:
I wanted to touch it
Explanation:
since you put the setting in the past you can use present verbs because we already know it's something that already happened
Given two strings, find all palindromes that can be formed with the letters of each string, From those palindromes, select one from each set that, when combined and rearranged, produces the longest palindrome possible, If there are multiple palindromes of that length, choose the alphabetically smallest of them. Example s1 « babbc"s2 = ddefefq' all of the leters of the first string can make a palindrome the choises using letters are [abcba, bacab] all of the letters of the second string can make a palindrome the choices using all letters are [abcba, bacab]
Using the knowledge in computational language in python it is possible to write a code that Given two strings, find all palindromes that can be formed with the letters of each string
Writting the code:def mergePalindromes(s1, s2):
'''
The function accepts the following parameters:
1. STRING s1
2. STRING s2
The function return a STRING
'''
# count dictionary maintains the count of each character in s1 and s2
count = {}
# find count of each character in s1
for c in s1:
count[c] = count.get(c, 0) + 1
# find count of each character in s1
for c in s2:
count[c] = count.get(c, 0) + 1
ans = ''
chars = count.keys() # all character in s1 and s2
# sort the chars in ascending order
chars = sorted(chars)
# iterate over the chars
for c in chars:
# if count of character c is even
if(count[c]%2 == 0):
# add character c to ans half of the count[c] number of times
ans += c * (count[c]//2)
# sets count[c] to 0
count[c] -= count[c]
# if count of character c is odd
else:
# add character c to ans half of the count[c] - 1 number of times
ans += c * ((count[c] - 1)//2)
# sets count[c] to 1
count[c] -= (count[c] - 1)
middle_char = '' # middle character of the ans
for c in chars:
# if count[c] is 1
if(count[c]):
# set middle character to c
middle_char = c
break
# add reverse of first half of the ans to ans to get palindrome
ans = ans + middle_char + ans[::-1]
# return ans
return ans
See more about python at brainly.com/question/18502436
#SPJ1
#include
using namespace std;
const int SIZE = 4;
bool isSorted(const int arr[], int size);
bool isNonDecreasing(const int arr[], int size);
bool isNonIncreasing(const int arr[], int size);
void printArr(const int arr[], int size);
int main()
{
int test1[] = { 4, 7, 10, 69 };
int test2[] = { 10, 9, 7, 3 };
int test3[] = { 19, 12, 23, 7 };
int test4[] = { 5, 5, 5, 5 };
if (!isSorted(test1, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test1, SIZE);
if (!isSorted(test2, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test2, SIZE);
if (!isSorted(test3, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test3, SIZE);
if (!isSorted(test4, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test4, SIZE);
return 0;
}
bool isSorted(const int arr[], int size)
{
// TODO: This function returns true if the array is sorted. It could be
// sorted in either non-increasing (descending) or non-decreasing (ascending)
// order. If the array is not sorted, this function returns false.
// HINT: Notice that the functions isNonDecreasing and isNonIncreasing are not
// called from main. Call the isNonDecreasing and isNonIncreasing functions here.
}
bool isNonDecreasing(const int arr[], int size)
{
// TODO: Loop through the array to check whether it is sorted in
// non-decreasing (in other words, ascending) order. If the array
// is non-decreasing, return true. Otherwise, return false.
}
bool isNonIncreasing(const int arr[], int size)
{
// TODO: Loop through the array to check whether it is sorted in
// non-increasing (in other words, descending) order. If the array
// is non-increasing, return true. Otherwise, return false.
}
void printArr(const int arr[], int size)
{
for (int i = 0; i < size; i++)
cout << arr[i] << " ";
cout << endl << endl;
}
Output
SORTED
4 7 10 69
SORTED
10 9 7 3
NOT SORTED
19 12 23 7
SORTED
5 5 5 5
Code
//The added part is in the bottom
#include <iostream>
using namespace std;
const int SIZE = 4;
bool isSorted (const int arr[], int size);
bool isNonDecreasing (const int arr[], int size);
bool isNonIncreasing (const int arr[], int size);
void printArr (const int arr[], int size);
int
main ()
{
int test1[] = { 4, 7, 10, 69 };
int test2[] = { 10, 9, 7, 3 };
int test3[] = { 19, 12, 23, 7 };
int test4[] = { 5, 5, 5, 5 };
if (!isSorted (test1, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test1, SIZE);
if (!isSorted (test2, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test2, SIZE);
if (!isSorted (test3, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test3, SIZE);
if (!isSorted (test4, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test4, SIZE);
return 0;
}
bool
isSorted (const int arr[], int size)
{
//Added part
if (isNonDecreasing (arr, size) || isNonIncreasing (arr, size))
{
return true;
}
else
{
return false;
}
}
bool
isNonDecreasing (const int arr[], int size)
{
for (int i = 0; i < (size - 1); i++)
{
if (arr[i] > arr[i + 1]) //It compares the n value with the n-1 value and output
{
return false;
break;
}
}
return true;
}
bool
isNonIncreasing (const int arr[], int size)
{
for (int i = 0; i < (size - 1); i++)
{
if (arr[i] < arr[i + 1]) //It compares the n value with the n-1 value and output reautilization of previous function by replacing only “<”
{
return false;
break;
}
}
return true;
}
void
printArr (const int arr[], int size)
{
for (int i = 0; i < size; i++)
cout << arr[i] << " ";
cout << endl << endl;
}
Which type of input device can identify users based on their voice?
KVM switch
biometric identification device
scanner
digitizer
Answer:
scanner is the answer your welcome
A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?
Since the vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you can respond is to Refer the vendor to the right personnel.
What is an example of a reference vendor?A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.
You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.
Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.
Learn more about pilot program from
https://brainly.com/question/28920126
#SPJ1
What is output? Select all that apply.
C = 0
while (c 10):
C = c + 5
print (c)
Answer:
The answer is:
5
10
Explanation:
In the while loop, we specify, if C is not equal to 10, C += 5 and print(c). When python reads the loop, python will check to see if C is equal to 10 and if not it will add 5 until C is more than or equal to 10. In addition, python will print(c) to the console until it hits 10. Once C is less than or equal to 10 the loop will stop. In this scenario, since we print c in the loop, the codes output will be the following:
5
10
hope this helps :D
Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.
1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE
Answer:
True
Explanation:
Python coding.............
Answer:
# Take in four positive integers
num1 = int(input("Enter the first number: "))
num2 = int(input("Enter the second number: "))
num3 = int(input("Enter the third number: "))
num4 = int(input("Enter the fourth number: "))
# Initialize the count of odd numbers
odd_count = 0
# Check each number for oddness
if num1 % 2 != 0:
odd_count += 1
if num2 % 2 != 0:
odd_count += 1
if num3 % 2 != 0:
odd_count += 1
if num4 % 2 != 0:
odd_count += 1
# Output the total count of odd numbers
print("The number of odd numbers is:", odd_count)
Explanation:
Enter the first number: 1
Enter the second number: 2
Enter the third number: 3
Enter the fourth number: 4
The number of odd numbers is: 2
Which of the following extracts service account credentials from Active Directory using a brute force for offline cracking over a non-secure network by using tickets or service principal names (SPNs)?
-Kerberoasting
-Credentials in LSASS
-Unattended installation
-DLL hijacking
Option A,
Kerberoasting is the extraction of service account credentials from Active Directory through brute force for offline cracking over a non-secure network by using tickets or service principal names (SPNs).Hence, the correct answer is Kerberoasting.
The technique is referred to as “Kerberoasting” since it is based on extracting Kerberos tickets. Kerberoasting is an attack technique that has been in use for a long time, and it continues to be a common technique among attackers.Kerberos is a computer network authentication protocol that uses a trusted third party to verify user credentials. It relies on the use of “tickets” to verify the identity of the user attempting to access a network resource. Kerberos is used by Active Directory (AD) domain controllers to authenticate client and service credentials for access to network resources. An SPN is a unique identifier that specifies the name of a network service associated with a specific host. It’s used to determine which service an authenticated user has access to. SPNs are used by Kerberos to determine the service account that is required for a specific network service. An SPN is made up of three components: the protocol, the service class, and the host name.
Learn more about "Internet" : https://brainly.com/question/2780939
#SPJ11
how are poorly worded messages a disadvantage to communication
A lack of knowing leads to negativity:
When people don’t have the information or knowledge they feel they need, low productivity results. The reason is pretty basic – people tend to avoid situations in which they will be seen as not knowing, not understanding or not having expertise. No one wants to look like they don’t know what to do. And just about everyone has a fear – whether based in reality or not – of being embarrassed or mocked.
Write a Java Program that asks the user for 12 months worth of rainfall stats. These values should be entered by the user and placed in an array. Once all the values are entered the
program should print out the average rainfall per month, highest rainfall month, and lowest rainfall month. Use the following values: Jan - 1.2", Feb - 2.8", Mar - 4.9". Apr - 11.3", May
12.3", June - 10.1", Jul - 7.9". Aug - 8.1", Sep - 6.7", Oct - 5.3", Nov. - 4.2". Dec - 3.9".
The average is: 6.5583, month with largest - May, month with lowest - Jan.
-
5
The program is an illustration of conditional statements and loops.
Conditional statements are used to make decisonsLoops are used for iterative purposesThe main program.The program written in Java, where comments are used to explain each action is as follows:
import java.util.*;
public class Main {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
//This declares the array
double rainfall[] = new double[12];
//This initializes the total amount of rainfall
double total = 0;
//This gets input for the array
for(int i = 0; i < 11; i++){
rainfall[i] = input.nextDouble();
total+=rainfall[i];
}
//This initializes the smallest and the largest amount of rainfall
double largest = 0; double smallest = 0;
int smallestMonth = 0; int largestMonth = 0;
for(int i=1; i< 12; i++){
//This determines the largest amount of rainfall
if(rainfall[i] > largest){ largestMonth = i; largest = rainfall[i]; }
//This determines the smallest amount of rainfall
else if (rainfall[i] < smallest){ smallestMonth = i; smallest = rainfall[i]; }
}
//This initializes the months
String months[] = new String[]{"January","February","March","April","May","June","August","September","October","November","December"};
//This prints the required output
System.out.println("The average is: " + total/12+", month with largest - "+months[largestMonth]+", month with lowest - "+months[smallestMonth]);
}
}
Read more about conditional statements and loops at:
https://brainly.com/question/24833629
Which federal legislation requires lending companies to notify consumers of changes in rates and fees?
The Fair Debt Collection Practices Act
The Fair Credit Reporting Act
The Credit Card Accountability Responsibility and Disclosure Act
The Equal Opportunity Act
Question
The federal legislation requires lending companies to notify consumers of changes in rates and fees. The correct option is third.
Who is a consumer?
The one who takes the benefit of the laws and legislations is called a consumer.
The consumer is always a citizen of the country. The legislation which requires lending companies to notify the change in fees and rates to the final customers or consumers.
The Credit Card Accountability Responsibility and Disclosure Act is a consumer protection law that was given to protect consumers from unfair practices by credit card issuers by requiring more transparency in credit card terms and conditions and adding limits to charges and interest rates.
Thus, the correct option is third.
Learn more about consumer.
https://brainly.com/question/13420317
#SPJ2
Answer:
The Credit Card Accountability Responsibility and Disclosure Act
Heads of dod components are responsible for establishing component specific procedures regarding transmission and transportation of classified material. What items must be considered when establishing these procedures?
When establishing procedures for the transmission and transportation of classified material, heads of DoD components must consider factors such as security protocols, encryption methods, authorized means of transport, personnel access controls, handling and storage guidelines, and adherence to classification guidelines and regulations.
Security Protocols: Ensure that appropriate security protocols are in place to safeguard the classified material during transmission and transportation.Encryption Methods: Implement secure encryption methods to protect the confidentiality and integrity of the classified material during transit.Authorized Means of Transport: Determine the approved methods of transport, such as secure courier services or encrypted electronic channels, that can be used for transmitting classified material.Personnel Access Controls: Establish strict access controls to restrict access to the classified material during transmission and transportation. This may involve authentication measures, background checks, and need-to-know requirements.Handling and Storage Guidelines: Define guidelines for how the classified material should be handled, packaged, and stored to prevent unauthorized access or loss during transit.Classification Guidelines and Regulations: Ensure compliance with classification guidelines and regulations, including marking, labeling, and packaging requirements for different levels of classified material.By considering these items, heads of DoD components can establish comprehensive and effective procedures to ensure the secure transmission and transportation of classified material.
For more such question on transportation
https://brainly.com/question/28206353
#SPJ8
solution identification, understand the process methods and information that are in the diagnostic process
The process of diagnosing involves a way to identify and understand problems or issues in a step-by-step way.
What is the diagnostic process?The way one can figure out what's wrong with something can be different depending on what it is (like a medical problem or a broken machine), but there are usually some basic steps and parts that we follow.
Getting Information: In this step, you gather important information and details about the problem or situation. This could mean talking to a patient about their health history, checking what kind of symptoms they have, or finding out details about a problem with a machine.
Learn more about diagnostic process from
https://brainly.com/question/3787717
#SPJ1
What menu and grouping commands is the "SORT" tool? ( please answering meeeee)
A)Home - editing
B) Edit - format
C )Page layout - sheet options
D) File - edit
What’s unique about windows 8 compared to earlier windows