1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
4 years ago
7

Harvey is creating a presentation for his school project. He wants to have the same look on all the slides of his presentation.

Which option should he use?
Computers and Technology
1 answer:
Misha Larkins [42]4 years ago
8 0
He should use PowerPoint and the design should be feathered
You might be interested in
What type of software is used to create letters and papers? ​
S_A_V [24]

Answer:a paper that haven’t been use

Explanation:

8 0
3 years ago
In spreadsheet programs, labels and constant values are always copied exactly to the new location; what happens to formulas when
Dima020 [189]

Answer:

absolute cell referencing

Explanation:

Excel has an A1 reference style, which means that the columns are called letters A to XFD and the rows have numbers, 1 to 1,048,576. The total number of columns in Excel 2007 is 16384.

A cell can contain a value, formula or constants. A formula begins with a sign = (equal). You can use values ​​from other cells in your formula. To use another value, create a reference to the cell that contains the value you want to use in your formula.

When you copy a cell that contains a relative reference and paste it into another cell, the relative reference changes

When you copy a formula that contains relative references, the reference changes when you paste it into another cell.

How much the reference changes in relation to the position of the copied cell and the position of the new cell in which the formula is pasted. Excel uses relative references by default.

Instead, an absolute reference in a formula remains the same if it is copied to another cell.

8 0
4 years ago
What else needs to be done when creating a site?
SSSSS [86.1K]
When you are creating a website, you will usually need to add details to the website. If you're coding a website as HTML, you always have to make sure your code is correct. If one thing is a mess up, you have to start the whole thing all over again. 
5 0
3 years ago
Write a program that asks the user to enter five different, integer numbers. The program then reports the largest number and the
Akimi4 [234]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

  int minn=INT_MAX;

   int maxx=INT_MIN;

   int n1,n2,n3,n4,n5;

   cout<<"enter five Numbers:";

   //read 5 Numbers

   cin>>n1>>n2>>n3>>n4>>n5;

   // find maximum

   if(n1>maxx)

    maxx=n1;

    if(n2>maxx)

    maxx=n2;

    if(n3>maxx)

    maxx=n3;

    if(n4>maxx)

    maxx=n4;

    if(n5>maxx)

    maxx=n5;

   // find minimum

   if(n1<minn)

    minn=n1;

    if(n2<minn)

    minn=n2;

    if(n3<minn)

    minn=n3;

    if(n4<minn)

    minn=n4;

    if(n5<minn)

    minn=n5;

   // print maximum and minimum

   cout<<"maximum of five numbers is: "<<maxx<<endl;

   cout<<"minimum of five numbers is: "<<minn<<endl;

return 0;

}

Explanation:

Declare two variables "minn" & "maxx" and initialize them with INT_MAX and INT_MIN respectively.Then read the five number from user and compare it with "minn" & "maxx" ,if input is greater than "maxx" then update "maxx" or if input is less than "minn" then update the "minn". After all the inputs, "minn" will have smallest and "maxx" will have largest value.

enter five Numbers:5 78 43 55 12

maximum of five numbers is: 78

minimum of five numbers is: 5

4 0
3 years ago
you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting p
Romashka-Z-Leto [24]

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

7 0
3 years ago
Other questions:
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • Write the java statement to creat an object mp4 class digital​
    8·1 answer
  • A router has just received the following new IP addresses: 88.62.108.0/21, 88.62.116.0/21, 88.62.120.0/21 and 88.62.128.0/21. If
    5·1 answer
  • When I press F3, F4, and any of my apps on my mac why wouldn't it do anything? Do you have a way to solve this problem? When I p
    10·2 answers
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
    12·2 answers
  • Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she i
    11·1 answer
  • In python,
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!