1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
4 years ago
14

To create a microsoft�� powerpoint�� presentation based on an installed template, click the

Computers and Technology
2 answers:
yawa3891 [41]4 years ago
8 0
To create a Microsoft power point presentation based on an installed template, click the template section
Levart [38]4 years ago
3 0
Go on to power point and go onto templates and then it will show templates
You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Is anyone else recieving a notification from brainly near the search bar about a message and click it and there nothing there???
Yakvenalex [24]

tessa the same with me I hate it and then I'll click I and then it's blank

4 0
4 years ago
Create a class that acts as a doubly linked list node. it should contain all the required data fields, at least 1 constructor, a
Zielflug [23.3K]

it is in Microsoft access


8 0
4 years ago
Which of the following is NOT a project management cause of failed projects? (Points : 2) Shortcuts taken during the project
muminat

Answer:

Inadequate analysis of system and the design

Explanation:

Some of the causes of failed project in project management are as follows:

  • Deficient hazard the executives.
  • Inadequately characterized task scope.  
  • Inability to recognize key presumptions.  
  • Undertaking administrators who need involvement and preparing.
  • Absence of powerful correspondence at all levels.
  • No utilization of formal techniques and procedures.  
  • Overrun of the budget

8 0
4 years ago
You wish to lift a 12,000 lb stone by a vertical distance of 15 ft. Unfortunately, you can only generate a maximum pushing force
miss Akunina [59]

Answer:

Full question?

Explanation:

Sorry for asking this but where's what you want answered?

8 0
3 years ago
Other questions:
  • 1.
    6·1 answer
  • Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
    13·1 answer
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • What are the advantages of knowing demographics over psychographics and vice versa?
    12·1 answer
  • JAVA
    10·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Monica is writing a paper, and it needs to contain a certain amount of words. What Word Online feature can she use?IndentingProo
    5·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
  • refer to the exhibit. a user pc has successfully transmitted packets to www.cisco. which ip address does the user pc target in o
    6·1 answer
  • A(n) _____ is the software that enables the os to control a device.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!