1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
5

To insert a new slide in an existing presentation, what menu should you select?

Computers and Technology
2 answers:
Irina18 [472]3 years ago
8 0
The "new slide" button
Lelechka [254]3 years ago
3 0
You would select add slide if you where using keynote! 
You might be interested in
Video digitization is the process of
Nonamiya [84]

Answer:

converting analog information into binary form, which can be more easily edited and shared

Explanation:

Digitization is conversion of data into digital format. Data is converted into small piece of storing unit called bits.  

Video digitization is the process of analog to digital conversion of video-graphic information. Analog signal is sampled based on its amplitude at uniformly distributed time period and then converted into binary data(bits) which is called digital data.

5 0
3 years ago
Read 2 more answers
What are the benefits of BYOD to organisations<br><br><br><br>​
lara [203]

Answer:

Hello, the benefits of BYOD organizations are,

greater flexibility.

increased workforce mobility.

increased efficiency and productivity.

higher employee satisfaction.

allows greater choice in device type.

cuts down hardware spending and software licensing costs.

cuts down on device management for business-owned devices.

Hope this helps :)

5 0
2 years ago
What are the programs in a computer​
stealth61 [152]

Answer:

Computer skills examples

Operating systems  

Office suites  

Presentation software

Spreadsheets  

Accounting software

Explanation:

A program is a set of ordered operations for a computer to do in computing. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the application is saved in a computer-accessible storage location.

4 0
3 years ago
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection
emmasim [6.3K]

Answer: ECC memory

Explanation:Error-correcting code(ECC) memory is used for the detection as well as correction of the internal storage data in the operating system. It is the memory code that cannot tolerated any type of the corruption in the data storage.

The ECC memory is usually found in the fields like financial computing, scientific etc.It is a reliable memory and provides high protection.Thus the technician should put the ECC memory in the workstation.

7 0
3 years ago
At which layers of the osi model do 802.11 wireless lans function
Bond [772]
At the data link and physical layers

The 802.11 wireless Lan function is a set of data link and physical layers. Data link layer or the MAC is responsible for effective link-link data transfer, addressing, error detection and frame validation. Physical layer on the other hand helps in placing bits on the network. Basically, all wireless and WI-FI systems conform use these two layers to format and control data to conform with 802.11 wireless Lan standards





7 0
4 years ago
Other questions:
  • Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
    14·1 answer
  • An initialization expression may be omitted from the for loop if no initialization is required.
    15·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
    5·2 answers
  • Refer to the image of the Cornell method, then use the drop-down menus to complete each statement. Number 1 should be . Number 2
    8·2 answers
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • System.out.print(two.indexOf('r'));
    8·2 answers
  • An anchor tag can be coded using which two attributes?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!