1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
6

What is master slide and tell about master slide

Computers and Technology
1 answer:
Elan Coil [88]3 years ago
5 0

The Master Slide is the design template or design theme used for the slides within your presentation. There are three different master slides—notes master, handout master, and the most common, the slide master. All are located under View > Master.

You might be interested in
A good way to assess your CPU usage is to:_______.
inna [77]
C is likely the best answer here.
8 0
3 years ago
What were the technological innovations that allowed for the rapid expansion of the railroads?
liraira [26]

Answer:

There are different phases of railroad expansion with the innovations in technology.

Explanation:

Few of the technological innovations are described below that leads in railroad expansion more rapid.

1. Centralized Traffic control (CTC) is introduced in 1960's that is used to control the traffic on railroads using different signal control.

2. In 1990's after computer technology involvement, railway ticket and reservation system is automate and being centralized. That makes the railroad expansion improve.

3. Bullet train technology has been introduced, that makes the railway trains more faster.

4. Electric trains has been introduced to use green energy and reduce the dependency on the fuel to make environment clean and green.

5 0
3 years ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
3 years ago
What do you observe on the filter paper strip after 2 to 3 hours?
just olya [345]
Is there pictures or anything esle to read in order to figure out the answer

5 0
3 years ago
Read 2 more answers
Is Bob Lazar telling a lie/withholding information?
Anon25 [30]

Answer:

I think he may be a nut, but I'm not sure, there's little evidence of what he says to be true.

6 0
3 years ago
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • It is okay to use a dust rag when cleaning the inside of a computer.
    9·2 answers
  • You listened to a song on your computer. did you use hardware or software? explain.
    15·1 answer
  • 1.where should the name of the website or company logo appear on a website
    5·2 answers
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
    15·2 answers
  • If I wanted to include a picture of a dog in my document, I could use _____. SmartArt WordArt clip art AutoCorrect
    13·1 answer
  • The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i
    15·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!