1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
2 years ago
11

If I want to make it look like slide number one is turning a page to slide number two, what

Computers and Technology
1 answer:
garik1379 [7]2 years ago
6 0

Answer:

Im not certain but I think thwir is one called flip

Explanation:

Kind of works like a book if thats what your asking for

You might be interested in
I need help 40 points and brainless if you answer
Reil [10]
The answer is c
But I’m not sure
8 0
3 years ago
Read 2 more answers
Which statement is true about the filtering technique? A. You cannot apply multiple filters. B. You cannot remove a filter once
Naily [24]

Answer:

<u>C. You cannot unhide rows by removing filters</u> is the correct statement about filtering technique.

Explanation:

We can apply multiple filters for rows or columns. If we would like to view the data satisfying multiple filters, this option can be used.

Once a filter is applied, it can be removed or added again. The hidden rows or columns will be visible once all the filters are removed. By building a selection list of all the rows that should not be visible, we can hide the rows by removing filters.  

Filters can be applied to any row or column.

5 0
3 years ago
How do I change my age on here?-<br> Why did it set it to 18???
zvonat [6]

Answer:

lol

Explanation:

go to edit profile

6 0
3 years ago
Read 2 more answers
If a movie starts at 305 and the movie is 2 hrs and 44 mins when does the movie end?
AURORKA [14]
3 : 05 + 2 : 44 = 5 : 49 

.......................................  
4 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Other questions:
  • helppppp asap!!!!!!!!!! Sara has just started using the Internet. She would like to be a little more efficient. In 3–4 sentences
    9·2 answers
  • A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
    15·1 answer
  • The physical parts or components of a computer system is called .
    6·1 answer
  • In 1-2 sentences describe how to use the thesaurus in the Word Processor
    11·2 answers
  • Write a program that prompts the user to enter a string (may contain spaces) and displays its last character. Enter s string: Pr
    13·1 answer
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answe
    9·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • Write Epic username plz
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!