1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
8

PLEASE HELP POWER POINT:

Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0
18: b format
20: b ctrl + and left mouse button
Nataly [62]3 years ago
5 0

18 is playback, not formatting.

You might be interested in
Question 10 of 10
ValentinkaMS [17]

Answer:

C. Dow Jones

Explanation:

It’s the Dow Jones certainly, and we also know it as Dow 30. You will find with a little research that Dow Jones is an index of the 30 carefully chosen blue-chip stocks, and general industrial stocks. And this is price prejudiced average, and of 30 stocks that can be well-thought-out as an all-purpose measure for the whole stock market performance.

3 0
3 years ago
Your search google for recipe for tonight dinner is an.example of ?​
Rina8888 [55]

The example is, ethier you need cooking classes or you wish to try something new

Hope the little humor helps

3 0
3 years ago
Read 2 more answers
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
3 years ago
Read 2 more answers
For businesses and organizations under recent compliance laws, data classification standards typically include private, confiden
Anon25 [30]

Answer:

True is the correct answer for the above question.

Explanation:

  • To secure the data is the first rule for any organization because when the data is lost or unsecured the whole system can have the problem.
  • If any person wants to hack the system or any organization then they first choose to hack the data of the system.
  • So there is a Hundred of law in the US taken by the US government at the Federal trade commission act to secure the data of the organization.
  • The above question also states the same which is defined above. Hence It is a true statement.
6 0
3 years ago
Select all the correct answers.
TEA [102]

Answer:

comlleting novice-level certifications working on one

4 0
3 years ago
Other questions:
  • Rags or wipes are considered non-hazardous waste when they are
    15·2 answers
  • From the video "Your Password Sucks", using computer power to guess your password by trying multiple variations one after the ot
    15·2 answers
  • What part of a file name does windows use to know which application to open to manage the file?
    13·2 answers
  • Can somebody help me?
    11·1 answer
  • Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
    14·1 answer
  • Assume that the following method header is for a method in class A.
    15·1 answer
  • What your computer can do to you?
    14·2 answers
  • Saving a file as a new filename can be accomplished through the Save As dialog box.
    13·1 answer
  • Which of the following is true of operations within a spreadsheet program’s built-in functions?
    15·2 answers
  • Why are salaried employees often excluded from overtime pay
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!