1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
4 years ago
5

In presentation software, what is the area that displays behind the information you place on a slide?

Computers and Technology
1 answer:
nydimaria [60]4 years ago
7 0
If I'm not mistaken this is the background usually very customizable this can make a boring presentation to fascinating one it all depends on how you experiment with the slides
You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Which is the most important reason you should properly cite information that you obtain from an Internet search? Question 2 opti
Pepsi [2]
It is to avoid plagiarizing someone else's work
3 0
4 years ago
Ada lovelace designed the first computer
muminat

Answer:      yes.                        

this was A very good question and after alot of digging up i finally found the answer by searching who was the first computer programmer on google :3

8 0
3 years ago
How to get the level 100 tier in fortnite please help <br><br><br><br> pssss. just a troll m8 ;)
inysia [295]

Answer:

Do missions : )

Explanation:

Fortnite is trash !

5 0
4 years ago
Read 2 more answers
Declare a variable named
zlopas [31]

The declared variable name populationChange suitable for holding numbers like  -593142 and 8930522 is as follows:

populationChange = -593142

populationChange = 8930522

<h3>Variable:</h3>

Variable are containers use for storing values of different datatypes. Python variable can be use to store various datatype without indicating the datatype. The variable can be used to store float, string, integer etc.

For example

myVariable = 345

The variable named populationChange that holds numbers like -593142 and 8930522 can be declared as follows;

populationChange = -593142

populationChange = 8930522

Note the code is written in python

learn more on python variable here: brainly.com/question/21335728

3 0
2 years ago
Other questions:
  • Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
    6·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    11·1 answer
  • so im doing this school challenge and the teachers said whats the average text a student gets a day so i need to get about 20 in
    13·2 answers
  • Pls help me with this pls
    7·2 answers
  • The "great big secret" Ohanian talks about is the idea that:
    15·1 answer
  • Create an array class consisting of a static array of three elements, and describe it in such a way that the Point and Vector cl
    8·1 answer
  • 2023 murano’s available intelligent awd adjusts the ________ to help maintain cornering control.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!