1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
13

What is the maximum number of fonts that should be used on a slide?

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
4 0
In my opinion maximum two different fonts is enough. If you have to explain a concept it's quite horrible to see a lot of fonts in the same slide.
You might be interested in
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
OleMash [197]

XOR is 1 when either of the inputs is 1 but not when they both are.

1 xor 1 = 0

3 0
3 years ago
A(n) __________ is a common list operation used in programming. its purpose is to iterate through a list of items, one item at a
Nataliya [291]
I would say C- Priority List.
I hope this helps! :)
5 0
3 years ago
Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the
riadik2000 [5.3K]

Answer: The last picture it looks better.

Explanation: Welcome!

8 0
3 years ago
Read 2 more answers
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
3 years ago
What’s let’s you see your mouse on the screen in order to click icons, buttons , and menus
tatyana61 [14]

Answer: Easy one.

Explanation:

This would be the OS. The OS has a mouse cursor for you to use in Windows, and Linux, it's the same thing for some BIOS'es aswell, and this goes for setting up Windows, or Linux off of a flash drive or CD.

7 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • The smallest unit of time in music called?
    6·2 answers
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • What is institutional advertising focused on promoting?
    8·1 answer
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • It is perhaps not surprising that Etsy was an early adopter of DevOps. It is a relatively small company, with a start-up culture
    7·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • What does Nicholas Carr suggest in his article "Is Google Making Us
    7·1 answer
  • One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
    12·2 answers
  • PLEASE WRITE A ONE SENTANCE SUMMARY, WILL GIVE BRAINLIEST!! (history of computers) You have completed an extensive investigation
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!