1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
9

In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.

Computers and Technology
1 answer:
kvasek [131]3 years ago
7 0

it actually is false i just checked

You might be interested in
To incorporate media such as audio or video into a PowerPoint presentation, a user would first navigate to the _____ tab.
Nadya [2.5K]

The answer is the Insert tab or the recording tab in PowerPoint 2016

You can use the insert tab in most versions of the Microsoft PowerPoint applications to add media files to your presentations. However, we have the recording tab introduced in PowerPoint 2016. This tab can also be used to add a screenshot, a recording, or a video to a slide

3 0
4 years ago
My computer screen keeps flashing black, it's on a very low brightness level and I very rarely put it up to high level unless I
mihalych1998 [28]
If your computer is old it may be the screen is dying or if its brand new it would probably  be the power supply check your battery or cables
6 0
4 years ago
Read 2 more answers
Which one of the following sstatements suggests a good method
PilotLPTM [1.2K]
The 2nd onnnnneeeeeee
7 0
3 years ago
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
RideAnS [48]

<u>Explanation:</u>

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

  • They help detect security loopholes before a cyberattack.
  • They determine how vulnerable a network or computer program is.
  • They advise the IT firm's security teams on how to mitigate vulnerabilities detected.

7 0
3 years ago
You can use the results from a search on a database in all of these ways except to ____.
Oksanka [162]
<span>Hello </span><span>Savonahdeedss4938
</span><span>

Answer: You can use the results from a search on a database in all of these ways except to create records


Hope this helps
-Chris</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • List and describe the three types of cloud models described by Microsoft.
    9·1 answer
  • Choose
    7·1 answer
  • Im new what are points
    6·2 answers
  • A user printed several documents to a shared network copier and noticed that they have very faint color density. A technician in
    9·1 answer
  • The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standa
    15·2 answers
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    11·1 answer
  • A web feed:
    7·2 answers
  • What is an html skeleton? If you know what it is can you write it for me?
    12·1 answer
  • A personal business letter may be written by ?
    8·1 answer
  • What do you think would have happened if early explorers had not followed their maps, charts, and compasses? (Give 4 examples in
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!