It is false that role-based access control (RBAC ) uses labels to determine the type and extent of access to a resource and the permission, or security, level granted to each user.
RBAC is a technique for controlling network access based on the roles of specific individuals inside an organization.
RBAC guarantees that employees only have access to the information they require to do their duties and stops them from obtaining information that is irrelevant to them.
The rights that are provided to an employee are based on their job within the business, which prevents lower-level employees from accessing sensitive data or carrying out high-level duties.
Roles are based on a number of criteria in the role-based access control data model, including authorization, responsibility, and job competency. As a result, businesses can specify whether a user is an administrator, specialist user, or end user. Additionally, access to computer resources can be restricted to certain capabilities, like the capacity to view and create.
To know more about RBAC click here:
https://brainly.com/question/15129911
#SPJ4
YOu are configuring the local security policy of a windows system. You wnat to prevent users from reusing old passwords. YOu also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (select two)enforce password historyPassword complexityMaximum password ageMinimum password age
Since You are configuring the local security policy of a windows system. You wnat to prevent users from reusing old passwords. The policies that you should configure are options A and D:
Enforce password history.Minimum password age.Why is a minimum age required for passwords?The Minimum Password Age policy is known to be one that establishes how long users must keep a password before changing it. The minimum password age will stop users from using a new password, changing it to their old one, and then bypassing the password system.
Therefore, one can say that Users can repeatedly use a small number of passwords by setting the Enforce password history option to a low number. If you don't also set a Minimum password age, users can change their password as often as necessary in order to reuse their original password.
Learn more about password history from
https://brainly.com/question/17193416
#SPJ1
Which unique feature of e-commerce is related to the ability to interact with web technology everywhere?.
Ubiquity is the unique feature of e-commerce is related to the ability to interact with web technology everywhere.
What is Ubiquity in E-commerce?
Why has e-commerce grown so quickly? The answer lies in the internet's and web technology's distinct features. Simply put, the internet and e-commerce technologies outperform previous technological revolutions such as television and radio. When compared to physical retail stores, services, and entertainment, e-commerce is also the fastest growing form of commerce.
The internet and web as a commercial medium have eight distinct characteristics that contribute to the rapid growth of e-commerce: ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization, and social technology.
To know more about internet, visit: https://brainly.com/question/2780939
#SPJ4
Which of the following Windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system?
A.HKLM\Software\Microsoft\Windows\CurrentVersion\Run
B. HKLM\SECURITY
C. %UserProfile%\ntuser.dat
D.HKCU\System\CurrentControlSet\Control\MediaProperties
HKLM\Software\Microsoft\Windows\CurrentVersion\Run is the windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system.
What's a registry key?The Windows operating system and any apps that choose to use the registry store low-level settings in a hierarchical database called the Windows Registry. The registry can be used by the kernel, device drivers, services, Security Accounts Manager, and user interfaces.It Offers Security The Registry offers two sizes of access control. To start, you can configure each workstation or server to forbid connections to the distant Registry. This is safe, but it also prevents you from editing policies on that machine using the System Policy Editor.Press Windows key + R, type cmd, and hit Enter to open the command prompt's Windows registry. Regedit should be typed into the Command Prompt and entered.To learn more about windows registry refer :
https://brainly.com/question/29490158
#SPJ4
A computer randomly generates numbers 1 through 100 for a lottery game. Every lottery ticket has 7 numbers on it. Identify the correct experiment, trial, and outcome below: Select all that apply: The experiment is the computer randomly generating a number The experiment is the computer randomly generating a number less than 10. A trial is one number generated. The trial is identifying the number generated. An outcome is the number 2 being generated. The outcome is the number being randomly generated.
Answer:
it were be a diffent number :
Social media professionals need to have a ______ approach that allows them to have a seamless integration of content, experiences, and messages for the user.A) dual channelB) omni channelC) hyper channelD) strategic channel
Social media professionals need to have a (Option B) Omni channel approach that allows them to have a seamless integration of content, experiences, and messages for the user.
Creating a Seamless User Experience with an Omni-Channel ApproachAn omni-channel approach is a type of marketing strategy that provides customers with an integrated shopping experience. It uses multiple channels to connect with customers, such as:
Physical storesWebsitesSocial mediaMobile apps, and moreThis allows customers to have a seamless experience regardless of the channel they use, which makes it easier for social media professionals to create content, experiences, and messages that are consistent across all channels.
Learn more about Marketing strategy: https://brainly.com/question/25369230
#SPJ4
which of the following specifications replaces wep with a stronger security standard that features changing encryption keys? group of answer choices O vpn O utm O aup O wpa2 O tlsAnswer: WPA2
The specifications that replaces wep with a stronger security standard that features changing encryption keys is option C: WPA2.
What is WPA2 (Wi-Fi Protected Access 2)?The encrypted security technology known as WPA2 (Wi-Fi Protected Access 2) guards internet traffic on wireless networks. The Wi-Fi Protected Access security protocol's second iteration, WPA2, fixes earlier issues and provides stronger encryption.
Note that the purpose of security standards is to increase the security of information technology. Hence, one can say that a security standard is "a published specification that establishes a common language, contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition."
Learn more about security standard fromhttps://brainly.com/question/14559510
#SPJ1
kaitlyn's summer interns are tasked with the repetitive and dull task of entering data all summer. which of the path-goal leadership styles should kaitlyn emphasize?
kaitlyn's summer interns are tasked with the repetitive and dull task of entering data all summer. Katlyn should emphasize on directive path-goal leadership style.
What is data entry?
Transcribing information into another media, typically through input into a computer program, is known as data entry. Handwritten documents, data from spreadsheets, series of numbers, computer code, and even names, and addresses are examples of data types that people might transcribe.
When entering data into a computer or comparable system, some businesses use audio input, which the user listens to. So that there are fewer pauses, the typist must be able to follow along as the tape progresses.
To learn more about data entry, use the link given
https://brainly.com/question/2089568
#SPJ4
Which term describes a piece of code that is distributed to allow additional functionality to be added to an existing program?
The term describing a piece of code that is distributed to allow additional functionality to be added to an existing program, is Plug-in.
This additional functionality is usually provided by an external developer and is intended to extend the capabilities of the existing program.
What is the Plug-in?Is a type of software that adds extra features to a program or application. It is used to extend the functionality of a program or application by providing additional features.
Plug-ins can range from simple tweaks to complex add-ons that drastically change the way a program or application works. Examples of plug-ins include:
Browser extensionsAudio effectsVideo filtersMoreLearn more about Plug-in:
https://brainly.com/question/7143308
#SPJ4
Assume the name of your dataframe is flavors_df. What code chunk lets you get a glimpse of the contents of the data frame?.
Assume the name of your dataframe is flavors_df. The code chunk that lets you get a glimpse of the contents of the data frame is option D: colnames(flavors_df)
What is a DataFrame?
It ia a term that is similar to a spreadsheet, a data structure called a dataframe arranges data into a 2-dimensional table of rows and columns. Because they provide a flexible and user-friendly method of storing and interacting with data, DataFrames are one of the most popular data structures used in contemporary data analytics.
Note that in regards to the question, the code block colnames(flavors df) is written by you. In this section of code:
Hence, you can examine the column names in the data frame with the function colnames().
So, the data frame that the colnames() function accepts as an argument is called flavors df.
Learn more about dataframe from
https://brainly.com/question/28209816
#SPJ1
See full question below
Assume the name of your data frame is flavors_df. What code chunk lets you review the column names in the data frame?
Single Choice Question. Please Choose The Correct Option ✔
A
rename(flavors_df)
B
col(flavors_df)
C
arrange(flavors_df)
D
colnames(flavors_df)
You recently installed several applications on Windows system. After doing so, you notice the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them.Startup
Startup
Click on the Startup tab in Task Manager that you would use to to stop applications that are automatically loaded when the system boots.
What is Task Manager?
The Task Manager is a component of the Microsoft Windows operating system that has been present since Windows NT 4.0 and Windows 2000. It allows you to view each task (process) as well as the overall performance of the computer. You can view how much memory a program is using, stop a frozen program, and view available system resources using the Task Manager.
Ctrl+Shift+Esc on the keyboard brings up the Task Manager. By right-clicking the taskbar and selecting Task Manager, you can also access the Task Manager.
To know more about Task Manager, visit: https://brainly.com/question/29110813
#SPJ4
which of the following is a benefit to integrating crm software into an existing erp? more than one answer may be correct.
improved customer service, enhanced data analysis, streamlined proccess are several benefits of CRM softwares
what are the benefits?There are several potential benefits to integrating customer relationship management (CRM) software into an existing enterprise resource planning (ERP) system:
Improved customer service: By integrating CRM and ERP systems, companies can provide more personalized and efficient customer service. For example, customer service representatives can access customer information and order history from the ERP system, which can help them resolve issues more quickly and accurately. Enhanced data analysis: Integrating CRM and ERP systems allows companies to access a wider range of data, which can be used for more sophisticated analysis and decision-making. For example, combining sales data from the CRM system with production and inventory data from the ERP system can help companies better understand customer demand and optimize their operations.Streamlined processes: Integrating CRM and ERP systems can help companies streamline their business processes by eliminating data silos and reducing manual data entry. For example, sales data entered into the CRM system can be automatically transferred to the ERP system, which can help prevent errors and reduce the need for manual data entry.Increased visibility: By integrating CRM and ERP systems, companies can gain greater visibility into their operations and customer interactions. For example, the CRM system can provide insight into customer preferences and trends, while the ERP system can provide information on production and inventory levels. This increased visibility can help companies make more informed business decisions.To Know More About CRM, Check Out
https://brainly.com/question/29577176
#SPJ1
The open source movement makes _____ available to everyone in an effort to continue to build and improve the functionality of open source software.
Answer:
programs
Explanation:
Which of the following are tasks you perform when creating tables? Select all the options that apply.a. Define the fields in the table.b. Arrange the controls for easy data entry.c. Select a data type for each field.d. Name the table.
The option that are tasks you perform when creating tables is option A , C and D:
Define the fields in the table. Select a data type for each field.How do you create a table?To create a simple table, select Insert > Table and drag the cursor over the grid until the desired number of columns and rows is highlighted. Choose Insert > Table > Insert Table to create a larger table or to edit an existing table.
So, in the excel or microsoft window, Click Insert>Table to create a table. A small menu will appear with a grid of what appear to be table cells. Choose the number of rows and columns for your table by hovering the mouse over them. Additionally, you can select the Insert Table option.
Therefore, as a person, You can create a table by creating a new database, inserting a table into an existing database, or importing or linking to a table from another data source, such as a Microsoft Excel workbook, that of a Microsoft Word document, a text file, or the use of database. Hence the options selected above are correct.
Learn more about creating tables fromhttps://brainly.com/question/29371681
#SPJ1
job scheduling consider the problem of scheduling n jobs of known durationst1, t2,...,tn for execution by a single processor. the jobs can be executed in any order, one job at a time. you want to find a schedule that minimizes
The collection of n tasks with known processing times and due dates can be referred to as the EDD rule; the least value of Lmax is obtained by sequencing the jobs in non-decreasing order of their due dates.
The goal of the interval scheduling maximization problem (ISMP) is to identify the largest compatible set, or a collection of intervals with the least possible overlap. The idea is to optimize throughput by completing as many tasks as you can. Greedy algorithms typically operate by beginning with an empty or "base" solution and adding items one at a time until all of them have been added and have the best "score" by the algorithm's defined standards.
Learn more about algorithm here-
https://brainly.com/question/22984934
#SPJ4
host e wants to send an ip datagram to host f. host e sends out an arp request to find out host f's mac address. what are the source ip address and the destination ip address of host f's arp reply.
Assume Host A wants to send an IP datagram to Host B, but neither A's nor B's ARP caches contain B's MAC address. Assume that the forwarding table of switch S1 only contains entries for Host B and router R1.
Explanation in Detail:
Because the destination address of the received ARPframe is a broadcast address, Switch S1 will broadcast the Ethernet frame over both of its interfaces. And it discovers that A lives on Subnet 1, which is linked to S1 via the interface connecting to Subnet 1. S1 will also add an entry for Host A to its forwarding table.
Yes, router R1 receives this ARP request message, but R1 does not forward it to Subnet 3. B will not send an ARP query message requesting A's MAC address because A's query message contains this information. When switch S1 receives B's response message, it will create an entry in its forwarding table for host B and then drop the received frame because destination host A is on the same interface as host B. ((In other words, A and B is in the same LAN segment).
To know more about IP Datagram, visit: https://brainly.com/question/29506804
#SPJ4
Lane received a phone call from a client. The client claimed that a file they were working on the day before had disappeared from their computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of their files were gone again. They also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client's computer?.
Since lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. The issue with the client's computer is d. Computer virus
What causes computer viruses?The clicking links in emails, messaging applications, or social network posts that lead to fraudulent websites. By hiding in the HTML of hijacked websites, sometimes known as drive-by downloads, viruses can be downloaded as soon as the page loads in your browser. using network drives or external hard drives that are infected with your device.
A computer virus is a form of malware that accompanies another program (such as a document) and has the ability to multiply and propagate once it has been run on a machine. For instance, you can accidentally open a harmful email attachment after receiving it, allowing the computer virus to infect your system.
Therefore, one can say that certain kind of computer program called a virus multiplies itself after being run by altering other programs and adding its own code.
Learn more about Computer virus from
https://brainly.com/question/27282045
#SPJ1
See full option below
What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus
the event logs most commonly used for troubleshooting are located in the applications and services logs node. true or false?
The event logs most commonly used for troubleshooting are located in the applications and services logs node is false.
What is troubleshooting?Troubleshooting is defined as the procedure for locating, organizing, and fixing a flaw, error, or problem in software or a computer system. It makes it possible to fix and restore a computer or piece of software when it breaks down, stops working, or behaves strangely.
For in-depth and targeted troubleshooting in Windows, use the Diagnostics-Networking, WLAN-Autoconfig, and System logs. Look for the Event Viewer to find these logs. Alternately, select Event Viewer under Administrative Tools in the Control Panel.
Thus, the event logs most commonly used for troubleshooting are located in the applications and services logs node is false.
To learn more about troubleshooting, refer to the link below:
https://brainly.com/question/29022893
#SPJ1
use prim's algorithm to find a minimal spanning tree for the times whose vertices are the hotels given in the distance chart. what is the total time for this spanning tree?
The greedy approach is the foundation of the Prim's algorithm. We choose the edge with the least weight at each step, assuming that the final node hasn't been reached yet.
The spanning tree would appear like this. All the names are written in shorthand. Kindly corelate.
What is spanning tree?
A spanning tree is a sub-graph of an undirected connected graph that contains all of the graph's vertices and the fewest number of edges possible between them. It is not a spanning tree if a vertex is missed. Weights may or may not be applied to the edges.
What is minimum spanning tree?
A minimum spanning tree is one in which the weight of the edges added together is as small as it can be.
To know more about spanning tree, check out:
https://brainly.com/question/13148966
#SPJ1
When filtering records in a query, the expression must return what kind of value?
a. a maximum or minimum value
b. a single text value
c. a positive number value
d. a true or false value
When filtering records in a query, the expression must return this kind of value: a. a maximum or minimum value.
What is SQL?SQL is an abbreviation for structured query language and it can be defined as a domain-specific programming language that is designed and developed for the management and communication of various data that are saved in a relational or structured database.
What is query?In Computer technology, a query can be defined as a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.
In database management system (DBMS), either a maximum or minimum value would be returned when the functions MIN() or MAX() are used in conjunction with a structured query language to filter records in a query, which corresponds to the values at the top or bottom values in a data field.
Read more on query here: brainly.com/question/27851066
#SPJ1
select the right order of the tcp/ip five-layer network model. 1 point physical layer > data link layer > transport layer > network layer > application layer physical layer > application layer > data link layer > network layer > transport layer physical layer > data link layer > network layer > transport layer > application layer. physical layer > network layer > data link layer > transport layer > application layer
The five-layer networking architecture serves as the foundation for the TCP/IP concept. These are the physical, data link, network, transport, and application layers, arranged from bottom (the link) to top.
The network access layer, internet layer, transport layer, and application layer are the four layers that make up the TCP/IP model (going from bottom to top). In the OSI Model's fifth layer: The OSI (Open Systems Interconnection) model's Session Layer regulates the conversations (connections) between computers. The connections between the local and distant applications are established, managed, and terminated by it. the OSI model's seven layers. Layer 1 is physical, followed by Layer 2 for data links, Layer 3 for networks, Layer 4 for transport, Layer 5 for sessions, Layer 6 for presentations, and Layer 7 for applications.
Learn more about connection here-
https://brainly.com/question/14327370
#SPJ4
Hispaniola is an island in the West Indies Caribbean Sea that contains two separate countries name these two c
The two countries on Hispaniola island are Haiti and the Dominican Republic make up Hispaniola. This is the second-largest in land area in the Caribbean Sea.
What is Hispaniola island?There are numerous islands in the Caribbean, sometimes referred to as the West Indies. the Caribbean islands mentioned There are three primary island groupings scattered across a sea that covers an area of 91,000 square miles between Venezuela and Florida:
The Bahamas, the Lesser and Greater Antilles. Following the island of Cuba in terms of area, Hispaniola is the most populated island in the West Indies.
Therefore, the two countries are Haiti and the Dominican Republic.
To learn more about Hispaniola island, refer to the link:
https://brainly.com/question/8159442
#SPJ1
a. what is a device register? b. what is a device data register? c. what is a device status register?
Register is a kind of computer memory that is used for rapidly accepting, storing, and transfering data and instructions that are being used immediately by the CPU. There are three kinds of register, namely:
MDR (Memory data registers). IR (index registers).MBR (Memory buffer registers).Learn more about register, here https://brainly.com/question/25760471
#SPJ4
Which options allow users to modify the existing data in a report?
a. Report or Create
b. Create or Design View
c. Design view or Layout view
d. Print Preview or Report
The options that allow users to modify the existing data in a report are:
Report or Create (Option A)Create or Design View (Option B).What is a report in computer science?A report is a published result of a table or query. It is used to analyze The data supplied in specified techniques.
A report is a succinct summary extracted from a broader set of facts, intended for a specific audience.
In certain circumstances, a report is a database item that comes in useful when you wish to display the data in your database for any of the following uses:
Display or share a summary of data. Preserve snapshots of the data. Provide details about specific records. Create labels.Learn more about reports:
https://brainly.com/question/15068287
#SPJ1
The adoption of ________ has been an important factor in the development of the internet of things.
Answer:
ipv6
Explanation:
ipv6
Navigate to the following Snhu resources and summarize specifically how each will or may assist you in achieving your personal mission statement and short-term goals. a. Snhu academic support- written feedback section b. Shapiro library c. Snhu career
d. One additional Snhu resource of your choosing
The summary of how each will or may assist you in achieving your personal mission statement and short-term goals, the right option is given below.
What is the summary of Snhu resources?a. SNHU Academic Support - Written Feedback Section: This resource may assist you in achieving your personal mission statement and short-term goals by providing you with feedback on your written work. This feedback can help you identify areas for improvement in your writing, which can help you develop your skills and achieve your goals.
b. Shapiro Library: The Shapiro Library can assist you in achieving your personal mission statement and short-term goals by providing access to a wide range of resources, including books, articles, and online databases. These resources can help you learn new information, develop new skills, and expand your knowledge, which can all contribute to achieving your goals.
c. SNHU Career: SNHU Career is a resource that can help you achieve your personal mission statement and short-term goals by providing career guidance and support. This may include help with resume writing, job searching, and networking, as well as access to job listings and career fairs.
d. One Additional SNHU Resource of Your Choosing: One additional SNHU resource that may be helpful in achieving your personal mission statement and short-term goals is the SNHU Student Success Center. The Student Success Center provides a range of resources and support services to help students succeed in their academic and personal lives. This may include tutoring, academic coaching, and access to study materials and resources.
Learn more about feedback from
https://brainly.com/question/28070508
#SPJ1
which type of internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth?
DSL internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth.
What is a DSL?
DSL internet is high-speed internet that you connect to via Wi-Fi or an ethernet cable via a modem. DSL is an abbreviation for Digital Subscriber Line/Loop, which is a data transmission medium that uses a copper telephone landline to receive data. (If you arrived here while looking for information on domain specific languages, also known as DSL, you should leave now.)
DSL is the most common type of broadband internet access, and it uses existing phone wiring to transmit data via a DSL modem, making the internet available to everyone.
To know more about DSL, visit: https://brainly.com/question/27961481?referrer=searchResults
#SPJ4
Which task would be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers”?
a. finding customers who have bought a minimum number of products
b. finding customers who have bought more than one of the same product
c. finding a company’s products that have never been sold
d. finding a company’s products that have sold for more than a certain amount
The task that will be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers” is option b. finding customers who have bought more than one of the same product
What is unmatched query wizard?With the help of this query wizard, you can build a query that lists any orphaned or widowed records present in two Microsoft Access tables. When a record in a relationship between two tables has many sides (child or related) but only one side (parent or primary), it is said to have orphaned records.
Note that The Find Unmatched Query, as its name suggests, shows records in one table or query that don't match any records in another table or query.
Therefore, On the Create tab, select Query Wizard from the Queries group. Click the Find Unmatched Query Wizard button twice in the New Query dialog box. Click Next after selecting the table with the mismatched records on the wizard's first page.
Learn more about Unmatched Queries Wizard from
https://brainly.com/question/6844569
#SPJ1
which two phases of the instruction cycle are always executed during the execution of an instruction? group of answer choices
The CPU does a cycle for each of these instructions before carrying them out.
Each instruction cycle in a simple computer includes the following stages: the memory to get the instruction. Decipher the directive. The fetch stage, the decode stage, and the execute stage are the three primary stages that make up this process. An instruction cycle is the sequence of steps the CPU must take in order to retrieve and carry out an instruction. It is made up of fetch and cycle execution. The stages between instruction fetch and instruction decode will be broken down by the 2-stage pipelined CPU as indicated by the red dotted line in the diagram.
Learn more about instruction here-
https://brainly.com/question/19570737
#SPJ4
what is an advantage of using electronic databases for research? they provide only the most up-to-date information. they provide smaller, more manageable amounts of information. they provide bibliographic information, abstracts, and full-text documents.
The ability to rapidly and easily search the information is one of the main benefits of using electronic databases.
What is the advantage of using databases for research?They enable you to perform searches across a range of sources. They frequently offer access to books and journal papers in their entirety. The knowledge you discover there is of a very high academic calibre.Databases provide advantages.Little redundancy of data.Enhanced data securityHigher consistency.Minimised upgrading errorsLess expensive data entry, storage, and retrieval.Enhanced data accessibility through host and query languages.Higher application programme integrity for data.These databases provide scholarly, peer-reviewed articles authored by reputable authors, including journalists, scholars, and subject-matter authorities. Users can discover the information they need more quickly because databases offer robust search options for limiting results.To Learn more About electronic databases refer to:
https://brainly.com/question/4499788
#SPJ4
Switch to the view where you can modify how the printed version of your presentation will look.
You must move to the View tab in MS PowerPoint where you can edit how your presentation will appear on paper.
You choose the Handout Master button from the Master Views Ribbon Group's View Ribbon Tab. Unwhite the screen because you are in slide show view. The Slide Show Options option was clicked.
The layout, headers, and footers, as well as the background, can all be changed on presentation handouts using the Handout Master tab. On every page of the printed handout, changes made to the master handout are visible.
Click the View tab, then select Handout Master from the Master Views group to view the available handout options.
You can adjust the orientation of handouts, set the slide size, and specify the number and layout of slides to print on each page under the Page Setup group. To completely personalise your layout, use the settings on the three menus (Handout Orientation, Slide Size, and Slides Per Page).
To learn more about MS PowerPoint click here:
https://brainly.com/question/16155315
#SPJ4