1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
14

In which can you see speaker notes?

Computers and Technology
1 answer:
vfiekz [6]4 years ago
7 0
Speaker notes<span> are </span>notes<span> added to PowerPoint presentation slides as a reference for the presenter. This is an area of a PowerPoint slide that is hidden during the presentation, and this is reserved for </span>notes<span> for the </span>speaker.  
<span>On the Slide Show tab (in the Monitors group), click Use Presenter View. <span>In the Display Settings dialog box (on the Monitor tab), click the monitor icon that you want to use to view your speaker notes, and then select the This is my main monitor check box.</span></span>
You might be interested in
In two to three sentences, describe how you would move a file.
Nina [5.8K]
<span />


You can move the file one of two ways. Your first option is to click and drag the file to another folder in the Folders pane on the left side of the window. Your second option is to right-click the file and choose Send To. Then choose from the options shown in the submenu that appears.



3 0
3 years ago
Read 2 more answers
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
How do i show all emails from same sender in outlook
OverLord2011 [107]

Your just gonna have to scroll through all of them until you find the right one or search for some key words.

4 0
3 years ago
Read 2 more answers
Join Viber Creations on Viber https://invite.viber.com/?g2=AQAboWGw5hKZN009gOjCULc4cbWKWg42%2BIFmJoPC93MPlt9kstcpJyU6yagPh050 |
Dovator [93]
Hmmmm
I have to say the step mom in Cinderella
7 0
3 years ago
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
katrin2010 [14]

Answer: Pseudocode represents a language like solution

Explanation:

Pseudocode can be defined as one of the informal ways of programming whose description doesn't require any strict programming language syntax or even underlying technological considerations because it's evident that, it's not actually a real programming language . It is used major for an outline/rough draft of a required program. It also summarizes the flow of program, excluding underlying details. Designers usually write pseudocode in order for programmers to fathom the project's requirements of the software and align code appropriately.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which type of financial institution typically has membership requirements?
    9·2 answers
  • Which type of device often controls IoT tasks?<br> Desktop<br> Laptop<br> Smartphone<br> Switch
    8·1 answer
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • C++ "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the se
    12·1 answer
  • Power point programm<br><br>​
    11·1 answer
  • What is Annually Teachers Planner?​
    13·1 answer
  • Help me, I'll mark brainiest
    12·1 answer
  • What is the dark, sticky substance that forms when tobacco is burned?
    15·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
  • A hardware component that keeps data and information when the device is not powered is called a ____ device.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!