1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
4 years ago
6

what font size should generally be used for the slide title to ensure that it is set off from the content

Computers and Technology
1 answer:
polet [3.4K]4 years ago
4 0
I would say that you should use 32 pt font
You might be interested in
In self-driving cars, which of the following can be controlled by their artificial intelligence software? Select 4 options.
Lorico [155]

braking

accelerating

steering

navigation

7 0
3 years ago
Read 2 more answers
When talking about careers in designing game art, the unit mentioned that a good portfolio and a clear record of experience in g
atroni [7]

Answer:

Explanation:

Many different answerd to this

I dont know what course your taking exactly but i'll do my best <3

Personnally im most interested in balancing in game rewards, balancing AI, or balancing in game currency.

Hmm... I dont really kno what you could add to your portfolio tho. Maybe some things you did that involve what youre interested in doing.

Hope this helps <3

8 0
3 years ago
Social media experts suggest that you use other means of communicating claims or complaints before turning to social media. Mess
AURORKA [14]

Answer:

Focus on facts.

Suggest improvements even in positive reviews.

Respond to the business if it offers to address your concern.

Explanation:

In order to establish credibility when posting complaints or reviews, focus must be on fact and must be well supported.

Readers will have more trust in a review that is balanced, therefore one must try to request suggestion for improvement even if the post is positive. Update can be done on original post to effect changes or bring in ideas gotten through communication with the business.

Since the website is permanent, one will be able to edit a post, but not to remove it. Also posts from unknown sources can be tracked, so transparency is needed

5 0
4 years ago
____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program pe
Vlada [557]
The answer is d labeling
7 0
3 years ago
The process of checking data for validity and integrity before placing it in a data warehouse is called Group of answer choices
guajiro [1.7K]

Answer:

data cleaning

Explanation:

Data cleaning exemplifies the process which includes identifying the incorrect, or inaccurate data from the records. It further proceeds its function in correcting and replacing the correct data in the records or database. By adding information, by deleting incorrect information and modifying the incorrect information are some of the ways by which data cleaning is done.

7 0
3 years ago
Other questions:
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Which of the following pathways relates to the Architecture and construction career cluster
    7·1 answer
  • Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
    6·1 answer
  • Write a Python function uniquely_sorted() that takes a list as a parameter, and returns the unique values in sorted order.
    15·1 answer
  • Suppose we are working with an error-correcting code that will allow all single-bit errors to be corrected for memory words of l
    5·1 answer
  • What are those jackets called the ones with lots of straps inside, like in movies where they store there ammo etc?
    13·1 answer
  • How do mass and social media differ
    8·1 answer
  • __init__(self, features, phones): create/initialize instance variables for features and the list of phones (optional) in the pla
    7·1 answer
  • Complete a flowchart and a Python program to calculate grade of a student based on marks using the following criteria:
    6·1 answer
  • Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!