1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
8

PLEASE HELP POWER POINT:

Computers and Technology
2 answers:
Allushta [10]3 years ago
6 0
18: b format
20: b ctrl + and left mouse button
Nataly [62]3 years ago
5 0

18 is playback, not formatting.

You might be interested in
What is Access? When would you use Access instead of Excel?
SpyIntel [72]

Answer:

Access is a database management system from Microsoft.

Explanation:

Access allows users to view, edit and delete data, manage database tables, forms, queries, reports and macros.

Access should be use instead of Excel when you need to manage data and have it organize, easy to search and available to different users. If you need to be able to track information that is in different categories but is related, Access is a better option.

4 0
4 years ago
1.5 code practice question 3
Svetach [21]

Answer: What the hell is that 243 suppose to be

Explanation:uhg

4 0
3 years ago
What are the benefits of computer?
Usimov [2.4K]

Answer:

online toutoring.

helpful games give mind relaxation.

4 0
3 years ago
Read 2 more answers
Write a python function that on input takes a list l of integers and returns the count of how many of the integers in the list a
stepan [7]
Def countEvenIntegers(integerList):     counter = 0     for item in integerList:          if (item%2 = 0):               counter += 1     return counter
5 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
Other questions:
  • A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
    14·1 answer
  • Can a normal glass prevent eye issues like wearing anti radiation glasses?​
    8·2 answers
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • eplace the underlines with the words in parentheses that follow: The ____ solves the ____ of a ____ by expressing an ____ in a _
    5·1 answer
  • ____ is designed for short-distance connections and has only a few lambdas, with a greater space between lambdas. Group of answe
    9·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • What do you believe is the future of certification?
    7·1 answer
  • Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
    9·1 answer
  • Does anyone know edhesive 4.3 question 1
    11·2 answers
  • Sophia's plays her favorite game on her phone, where the game uses the phone's
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!