1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
7

To edit the text in a smartart graphic, what must be done first ?

Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
8 0
C Hope this helps :D
xxMikexx [17]3 years ago
6 0

The answer is D: Delete the information in the text box

You are able to adjust the look of a SmartArt graphic by changing the pattern of text in the SmartArt shapes. To edit the text in a SmartArt graphic, all is required is click the text that you want to delete a fill from.

You might be interested in
You have decided to remove a recently installed feature which method can you use to remove this feature
Aliun [14]
If it is on the desktop screen you just right click on the icon and select delete. from there if you're on a windows computer it goes to your recycle bin then you right click the recycle bin and a little rectangle pops up an in that rectangle it says clear recycle bin and once you press that all of the stuff that was in there is deleted. now if your on a computer that has chrome os installed you just go to the files screen and right click what you want to delete and click delete and it's gone. 
6 0
3 years ago
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Write a program to find the product of 3 numbers
ziro4ka [17]

Answer:

#include<iostream>

using namespace std;

int main()

{

   int a,b,c;

   cout<<"enter the value of a:";

   cin>>a;

   cout<<"enter the value of b:";

   cin>>b;

   cout<<"enter the value of c:";

   cin>>c;

   cout<<"product is:"<<(a*b*c);

   return 0;

}

Explanation:

6 0
3 years ago
Read 2 more answers
you just bought a new hard drive for your computer you plan to use this as a secondary hard drive to store all um a files once i
mihalych1998 [28]
Well, you need to partition your hard drive. Partitioning your hard drive designates usable space on your hdd.

And you need to format your hard drive. Formatting installs a file system on to your hard drive, it allows the operating system to read, write and overall understand the data stored on the disk. Without it, an OS cannot keep track of file locations, nor can it typically identify already used sectors (space) on a hdd. 
However, neither of these two concepts are tests.  
7 0
3 years ago
Other questions:
  • What OS has a large market share but is limited because it can be installed only on one particular brand?
    8·2 answers
  • Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?
    5·2 answers
  • Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
    10·1 answer
  • If you have two tasks x and y, with y being a successor to x, if we mark x as undone (because it needs to be redone for some rea
    15·1 answer
  • Identify the benefit of modeling to communicate a solution. ​
    11·2 answers
  • write a C program the prints out the size of variables with the following C data types- int, long, unsigned, long long, double,
    7·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • Circuit-switched networks provide connection between two parties that: Group of answer choices is dedicated for use by the parti
    10·1 answer
  • Why doesn't brainly give me 15 questions a day
    11·2 answers
  • _____ refers to the programs that a device can run.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!