1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
4 years ago
11

PLEASE HELP AAAAA IM SORRY !!!!!!!!!!

Computers and Technology
2 answers:
Oduvanchick [21]4 years ago
5 0

Answer:

"Hide Slide" button

Explanation:

If there is a slide you need to have in your presentation file, but do not want to be shown during the slideshow, Microsoft PowerPoint 2013 or recent has an option to provide this functionality.

First you need to select the slide to hide, then on the top, select the "Slide Show" tab, and finally click the "Hide Slide" button. Repeat for each slide needed (there is an image attached of the button to press.)

A faster way is to use the left navigation pane, press left click on the slide's thumbnail and select the "Hide Slide" option.

To un-hide any slide, repeat the same process.

Nookie1986 [14]4 years ago
4 0
Wouldn't it be Hide Slide or something related to that?
You might be interested in
The extension name of a java bytecode file is ________.
GrogVix [38]
Class










------------------------------------
7 0
4 years ago
What is a wireless network that provides communication over a short distance that is intended for use with devices that are owne
andrew11 [14]

Answer: personal area network

Explanation:

it can connect personal devices to make network, the personal network are phone,laptop,printer and soon in order to communicate.

3 0
3 years ago
Read 2 more answers
the php function that is executed is a connection to a database cannot be made is the____ function. die | isset| end | connect.
Pepsi [2]

The PHP function that is executed is a connection to a database that cannot be made is the die() function.

An error is an undesirable programming outcome. The mistake is a subset of the error. Error management is a vital component of any website or programme.

Error handling is a mechanism for identifying errors that a programme makes and taking appropriate corrective action. This can be done by utilising die() method.

When a programming problem occurs, the software will halt further code execution and display the appropriate error message to the user. The die() function displays a message and terminates the running of the programme.

The connect() function in PHP is one that is used to establish a connection to a database.

The end() method in PHP is used to locate the final element of the specified array. The end() function updates an array's internal pointer to refer to the final element and returns that element's value.

The isset() function examines whether a variable is set, which implies that it has to be declared and is not NULL. If the variable is present and not NULL, this function will return true; otherwise, it will return false.

To learn more about PHP click here:

brainly.com/question/29740624

#SPJ4

4 0
2 years ago
What does the R in the acronym SMART stand for??
jeyben [28]
Depending on who you ask, it is either Realistic or Relevant. Organizations that can't choose sometimes use the acronym SMARRT.
7 0
4 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Other questions:
  • Which are examples of copyrighted online materials? Check all that apply.
    14·2 answers
  • You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
    5·1 answer
  • Draw directed graphs representing relations of the following types.
    6·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Six external parts of a computer system
    13·1 answer
  • 16. A
    15·1 answer
  • Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
    8·1 answer
  • Queries in Access can be used ______________
    9·1 answer
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!