1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
1 year ago
14

Henry wants to create a presentation for his clients. He wants to upload the presentation file directly to the Internet. Which p

resentation software can Henry use
Computers and Technology
1 answer:
Ierofanga [76]1 year ago
8 0

Answer:

styrofoam and petroleum

Explanation:

You might be interested in
Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
alisha [4.7K]

Answer:

Sound design components include sound effects or SFX sound design, mixing, Foley sound design, dialogue, and music.

Explanation:

3 0
2 years ago
What are the three algorithm constructs?
zubka84 [21]

Answer:

The algorithm constructs are sequence, decision/selection and repetition.

Explanation:

5 0
3 years ago
What type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU
erma4kov [3.2K]

The type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU is custom.

<h3>What is custom priority in Outlook tasks?</h3>

Outlook is known to have a  New Tasks window that often shows a created-in Priority field that has  Low, Normal, and High setting.

This setting above is a custom one and it is one where a person can sort tasks by using its priority level instead of due date. This help to have  more perspective and one can reorganize their tasks when needed.

Learn more about task  from

brainly.com/question/12831236

3 0
2 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
Other questions:
  • type the correct answer in the Box spell the words correctly Caleb is working on a simple logic base program to stimulate the ga
    5·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • Page No.
    10·1 answer
  • Please help!<br><br> What is a non-iterative programming structure?
    11·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • Which external reference is formatted correctly?
    6·2 answers
  • Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are some
    11·2 answers
  • What is the "Driver's Compact Law"?
    8·2 answers
  • 30 POINTS FOR THE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!