1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
14

Jeff needs to apply a theme and change the font of the theme in the presentation that he is making. Put the steps in the order t

hat Jeff should perform them.
match each one /////
select a theme from the themes option
select the desighn tab
select the fonts tab and click on the desired font
Computers and Technology
1 answer:
katrin [286]3 years ago
8 0

1: Select the design tab.

2: Select a theme...

3: select the fonts...

4: Match each one.

You might be interested in
For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
stira [4]

Explanation:

a table of the chemical elements arranged in order of atomic number, usually in rows, so that elements with similar atomic structure (and hence similar chemical properties) appear in vertical columns.

6 0
3 years ago
What is a “spoof” of an ad ?
kykrilka [37]
I think a spoof of an ad is the study of an ads rhetorical devices that is what I think I am not completely sure
5 0
3 years ago
Read 2 more answers
which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
Ivahew [28]

Answer:

implements CSMA/CD over legacy shared half-duplex media; enables IPv4 and IPv6 to utilize the same physical medium; integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper

Explanation:

I hope it helped . follow me on ig minisized._miyaa

8 0
3 years ago
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    9·2 answers
  • Suppose sum and num are int variables, and the input is 18 25 61 6 -1
    11·2 answers
  • Question 1 :The most common business firewall technique is to use a firewall server in conjunction with:This task contains the r
    11·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Ma
    5·1 answer
  • Viruses and worms can affect a system by:
    11·2 answers
  • Identify the symbol. please help!!<br>​
    7·2 answers
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • What is the benefit of encapsulation?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!