1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
15

You will use the _____

Computers and Technology
2 answers:
allochka39001 [22]3 years ago
6 0

<span>The answer is Microsoft PowerPoint.  You will use the power point option to change a slide from a text-only layout to a text and content layout.    </span>

<span>Moreover, the text frames and content are modify or place in the chosen slides with sounds and animations that could make your presentation more attractive.</span>

Marrrta [24]3 years ago
5 0

Sorry for the late answer but it is Slide Layout.

You might be interested in
Computers can think for themselves<br><br> True<br><br> False
gizmo_the_mogwai [7]

Answer:

false

Explanation:

4 0
3 years ago
Read 2 more answers
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
What are the three workplace violence prevention strategies covered in this module?
klemol [59]
Three Workplace violence prevention strategies would be:

A.) <span>Employer and employee involvement
B.) Remain Calm
C.) Call 911

Hope this helps!</span>
8 0
3 years ago
What does the coding phase involve?
Harman [31]

Answer:

I do believe it is D im not sure

5 0
3 years ago
Read 2 more answers
Other questions:
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • The four general functions of any application program are: data storage, data access logic, application logic and presentation l
    11·1 answer
  • Earth's current era is the _______ era.
    9·2 answers
  • Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i &lt; word.length/2;
    11·2 answers
  • The most common Unicode transformation formats are UTF- ______ and UTF-16.
    9·1 answer
  • Electrical sign connect mainly to​
    8·1 answer
  • A peripheral can be used to tell a computer to complete a specific task.<br> A) True <br> B)False
    13·1 answer
  • Which of the following rights is NOT guaranteed by copyright?
    11·1 answer
  • William is an Architect in charge of designing a new library for a city. Which tasks will he need to perform to ensure the proje
    10·2 answers
  • 22. Write the following in full un computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!