1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
9

You have inserted new slides based on a Word outline. How do you format these new slides to match the PowerPoint presentation fo

rmatting?
A. Select all slides in the presentation and click Format on the Home tab.
B. Select the new slides and click Reset on the Home tab.
C. Select all slides in the presentation and click Reset on the Home tab.
D. Select the new slides and click Format on the Home tab.
Computers and Technology
2 answers:
snow_lady [41]3 years ago
8 0

It would be either A or D. Either way, you would get your pptx to look good.

If you need any questions about Access Database, ask me, I took a college class on Access Database, and I am an expert at it.

Thank you!

irina1246 [14]3 years ago
8 0

Answer:

A

Explanation:

You might be interested in
What is an audit trail?
rewona [7]

Answer:

poop

Explanation:

poop

3 0
3 years ago
Read 2 more answers
Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
shutvik [7]
I'm not quite sure but it maybe b
6 0
3 years ago
Read 2 more answers
GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
ki77a [65]

Answer:

an enterprise architecture

Explanation:

Based on the information provided within the question it can be said that in this scenario it seems that GenXTech is creating an enterprise architecture. This is a blueprint made for a company that illustrates and defines all the finer details regarding the structure and operation of an organization, as well as where the organization should be heading in order to achieve the business goals that have already been set.

6 0
3 years ago
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
DerKrebs [107]

Answer:

A) False

Explanation:

Extranet

An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.

Intranet

Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.

The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.

This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.

4 0
3 years ago
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
sergiy2304 [10]

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

3 0
2 years ago
Other questions:
  • How many keywords are there in C programming language
    8·1 answer
  • The syntax for accessing a class (struct) member using the operator -&gt; is ____.
    15·2 answers
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • I need help with this plz question 2 and 3 asap
    7·1 answer
  • Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, follow
    9·1 answer
  • Where is the BIOS stored?<br><br> CPU<br> CMOS<br> RAM<br> Northbridge
    13·2 answers
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • What is smarta Art ? ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!