1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
12

What is the 7 X 7 when referring to PowerPoint presentations?

Computers and Technology
2 answers:
Vilka [71]3 years ago
8 0
<span>The rule of 7x7 helps you serve up information in small, readily digestible doses that help you make your point.</span>
sasho [114]3 years ago
5 0
Do u mean to the power cause that means for example:
    

EX.):  7 with a power of 4 so that's 7*7*7*7=28
Did i help
You might be interested in
The home page box will only appear with what people you may know
mariarad [96]
Whats the qustion...
3 0
4 years ago
Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?
gladu [14]

The use of the inheritance to have a structure inherit attributes and methods of classes above it.


One of the key milestones in the period in which the object-relational model was created was the creation of a data
model that closely represented the real world. In this approach, objects were created in which both data and its
relationships were all contained in one place. These data models were becoming a norm to be stored on the web. They
also incorporated support for star schemas within data warehouses. Objects that had similar characteristics were
grouped into classes, where they had a shared structure of attributes and behaviors.

3 0
2 years ago
1. Which sentence best expresses the main idea
Neko [114]
B is the answer

Hope this helps




3 0
3 years ago
Which of the following can you use to judge source legitimacy?
Sholpan [36]

Answer:

The answer is A

Explanation:

To judge a sources legitimacy is to find factual evidence on a page. Does the page use sources as well? Does the source come from a domain such as: .edu .gov etc.? Does the author show non opinions? If the answer to these questions is yes then your credible resource is accurate.

3 0
3 years ago
Read 2 more answers
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Other questions:
  • Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dy
    8·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is
    5·1 answer
  • Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
    9·1 answer
  • Which of the following views hides the ribbon and shows text on the screen in an easy-to-read format?: *
    11·1 answer
  • Describe the following types of Cloud services:
    11·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • How many sets of number do both Hex and RGB values have?
    10·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
  • Which of the following statements is true when it comes to developing a web presence for a business?
    6·1 answer
  • What are three ways digital identity is created and kept up? (open answer)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!