1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
7

After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t

o save her presentation again. How can she accomplish this task? Check all that apply.
She can press the keys Ctrl+S.
She can press the function key F12.
She can open the File tab and click Save.
She can go to the Backstage view and click Save As.
She can click the Save option in the Quick Access tool bar.
Computers and Technology
1 answer:
liberstina [14]3 years ago
7 0

Answer:

a, c, & e

Explanation:

You might be interested in
Convert the following hexadecimal numbers to decimal numbers. (Show your work) a. 0xE3 b. 0x4A c. 0xF9
MAVERICK [17]

Answer:

a. 227 , b. 74 , c. 249

Explanation:

a. 0x E3 = 227

Hexadecimal Digit E corresponds to decimal number 14.

So decimal representation = 14 * 16 + 3 = 224 + 3 = 227

b. 0x 4A = 74

Hexadecimal Digit A corresponds to decimal number 10.

So decimal representation = 4 * 16 + 10 = 74

c. 0x F9 =

Hexadecimal Digit F corresponds to decimal number 15.

So decimal representation = 15 * 16 + 9 = 240 + 9 = 249

3 0
3 years ago
A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
Tema [17]

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.

8 0
2 years ago
Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
svet-max [94.6K]

Answer:

D. have function return the whole array

Explanation:

the given function only return first occurrence of target. In order to get all occurrences of target we have to change condition in while loop to check whole array even if first occurrence of target found and plus add another parameter of type array that will store different  indexes of occurrence of target and return that array

8 0
3 years ago
Help plz
Sonbull [250]

1.

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

   return max(num1, num2)

print(func(first, second))

2.

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

   return sorted([word1,word2])[0]

print(func(first, second))

I hope this helps!

8 0
3 years ago
How should work be allocated to the team in a Scrum project?
Mkey [24]

Answer:

In a Scrum project, the work or the tasks are not allotted specifically. The Scrum Master is not allowed to assign tasks to the team members under any circumstance. Once the client provides the details regarding their requirements in detail, the tasks are distributed based on the expertise and skills of the employee.

Explanation:

4 0
3 years ago
Other questions:
  • For a color display using 8 bits for each of the primary colors (red, green, blue) per pixel, what should be the minimum size in
    6·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • What is the term for a Web site that allows users to access and interact with software from any Internet-connected computer or d
    11·1 answer
  • What is the work of the cpu as processer
    6·2 answers
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • What are the 5 font/typography families
    14·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • In a typical office, biometric authentication might be used to control access to employees and registered visitors only. We know
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!