1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
4 years ago
12

How to add bullet points in google slides??

Computers and Technology
2 answers:
Elena-2011 [213]4 years ago
7 0
By doing bullet points you just need to use this ~ because it helps and makes the presentation look way better
Anettt [7]4 years ago
6 0
<span>Open a document or presentation.Add or select a text box.<span>On the toolbar, click Bulleted list  or Numbered list .<span>Note: If you don't see the option, click More.</span></span>To change the style of the bullets or numbers, click the dropdown arrow next to the icons in the toolbar</span>
You might be interested in
Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
GuDViN [60]
A bottom up approach because group of a set choices can’t be the answer
7 0
3 years ago
Localize the software problem and describe it<br>​
sweet [91]

Answer:

Do you have any idea how to get the best and most importantly I

5 0
3 years ago
what is internet ?? mention five ways one can use the internet profitably. state five disadvantages of the internet.​
rosijanka [135]

The Internet can be best described as network of networks since it connects over 50 million computer worldwide.

3 0
3 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Features present in most GUIs include _____.
julsineya [31]

Answer:

erfgt

Explanation:

5 0
4 years ago
Other questions:
  • For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
    11·1 answer
  • What does API stand for
    7·2 answers
  • Which tool is best used to test an electrical current for a power source?
    8·1 answer
  • Iven an array temps of double s, containing temperature data, compute the average temperature. Store the average in a variable c
    10·1 answer
  • In c++ 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
    6·1 answer
  • State reasons why new version of application packages are released often?​
    11·2 answers
  • In this problem, you will write three methods to:
    12·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • How do films use camera shots?
    10·2 answers
  • Which type of input devices used in big hero 6 movie
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!