1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
8

A general rule for adding text to a slide is ____.

Computers and Technology
2 answers:
Rama09 [41]3 years ago
4 0

A general rule for adding text to a slide is to use not more than two fonts in a presentation and vary the font size. Furthermore, to make a slide legible, in addition to the point size, attention must be paid to the word count per slide, the choice of typeface, and the visual balance of  space to text.

jeka57 [31]3 years ago
4 0

A general rule for adding text to a slide is to not use more than two fonts in the slide. Also, make sure to used different font sizes in the presentation. You can add photographs, charts and table etc in the presentation to make it more attractive.

Further Explanation:

Some experts say that while adding text to a slide follows the six cross six rule. Each text slide has six bullet points of nearly six words. Also, make your text concise and name is attractive. The bullet points could vary from 4 to 8 points but they should be short and easy to understand. Don’t feel to fill the slide always. Sometimes, it is okay to have blank space in the slide. The language of the slide should be easy to read.

Try to add examples when making a point in the slide so that it catches the audience’s interest. Always try to mention those points which have strongest material.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: Senior Secondary School

Subject: Computer Science

Chapter: Microsoft Office

Keyword:

Microsoft word, software, general rule, text, slide, bullet points, concise, bullet points, mention, interest, strongest, material, read, basics, power point, word, excel, access,  

You might be interested in
To protect a computer, it is a good idea to install and frequently run
Triss [41]

Answer:

anti virus software

Explanation

did the quiz :)

5 0
3 years ago
Read 2 more answers
If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in t
lord [1]

Answer:

The answer is "750".

Explanation:

Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.

7 0
3 years ago
Which of the following is the BEST reason to use cash for making purchases? everfi
alexgriva [62]

Answer: knowing what you spend".

Explanation:

The reason to use cash for making purchases is to know how much one has spent.

When we use cash rather than using credit card, it's easier for one to know how much that has been spent. Also, one can easily know when he or she need to stop spending. Therefore, the correct answer is "knowing what you spend".

8 0
3 years ago
To display or distribute information from a database, programmers or database administrators create ___ .
Rainbow [258]
The answer is Reports.  To display or distribute information from a database, programmers or database administrators create Reports.
3 0
3 years ago
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
Other questions:
  • A ________ is a set of programs that manipulate the data within a database.
    12·1 answer
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Jesse is trying to find a computer file. he types the name of the file into the computer search bar. the computer is most likely
    5·2 answers
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • If you want to change the smart quote settings, what steps should you follow to find them?
    5·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • Write the algorithm for finding the perimeter of a rectangle using English like form step by step
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!