1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
12

ASAP!!!!!!! 6.From Excel to PowerPoint, you can copy and paste

Computers and Technology
1 answer:
KIM [24]3 years ago
4 0
Your answer is A.

<em>Let me know if you have any other questions! ♥</em>
You might be interested in
Why is binary code made up of a series of ones and zeros?
Nadusha1986 [10]

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often the binary number system's 0 and 1. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

8 0
3 years ago
What are the six peripherals of a computer system
Lubov Fominskaja [6]
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

4 0
3 years ago
In one or more complete sentences, explain about vehicle maintenance and vehicle safety
aivan3 [116]
Vehicle maintenance is important because without them the vehicle would not function properly and could be a safety hazard. Vehicle safety is important because without it we could end up seriously injured or even killed, vehicles can be very dangerous if handled irresponsible and the proper safety methods are not used.<span />
5 0
3 years ago
Read 2 more answers
Which electrical protective device is designed. To detect a difference in current between circuits wires and interrupt the circu
Rudik [331]
 Circuit breaker beacuse it cuts everything off
7 0
2 years ago
Explain how a third party cookie can track your web browsing across multiple web domains.
Vlada [557]
A third party cookie can stay in your hard drive or browsing files, and record all the action

Hope this helps.
3 0
3 years ago
Other questions:
  • Write a program that allows the user to convert a temperature given in degrees from either Celsius to Fahrenheit or Fahrenheit t
    13·1 answer
  • ____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
    6·1 answer
  • What is the advantage of using Mail Merge Wizard when creating a mail merge?
    12·2 answers
  • When RadioButton objects are contained in a group box, the user can select only one of the radio buttons on the panel.
    12·1 answer
  • .<br> 1. Press the _______ key to move to the next cell in a row.
    14·2 answers
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • What are the purposes of a good web page design?
    9·2 answers
  • Running away from home
    11·2 answers
  • What is a closed system?​
    7·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!