1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
7

If you want to add text in an area of a slide where a content placeholder is not located, you can insert a(n) _______________.

Computers and Technology
1 answer:
bulgar [2K]3 years ago
6 0
You can insert a text box ~ wubba lubba dub dub!
You might be interested in
A teacher wants to check the typing proficiency of five students. She gives all of them the same passage to type. Which student
Hitman42 [59]

The student who uses macros for long words. They are most likely to pass words very easily because they have a macro. While not only saving time, also making a stunning performance as macros usually auto correct as well.

5 0
3 years ago
PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
Fofino [41]

Answer:

She could have given access to the computer to the techician

Explanation:

"as well as any special settings or configurations she thinks may be relevant." This might inculd any information to hack the computer

6 0
3 years ago
One of the most toxic components of a computer is the _________.a. plastic in the keyboardb. silicon in the glass of the compute
Burka [1]

Answer:

C. Lead embedded in the glass of the monitor.

Explanation:

Cathode Ray Tube (CRT) monitors have lead embedded in their glass. Exposure to small quantities of lead can lead to lead poisoning. There are about 2.2 kilograms of lead in a big CRT monitor.

This amount of lead is mixed with the glass to improve the optical quality and to stop radiation from affecting the user.

Exposure to lead can cause the following:

  1. Constipation.
  2. Irritability,
  3. Headaches
  4. Aggressive behavior and so much more.
3 0
4 years ago
Read 2 more answers
If you want to encrypt all authorization information as it passes through your network, what could you use?
amid [387]

Answer:

You should use the TACACS+, also known by the term "Terminal Access Controller Access Control System Plus".

Explanation:

This protocol provides users with comprehensive accounting information and an adaptable administrative control over processes like accounting, authorization, and authentication. Clients using the TACACS+ can ask for a comprehensive access control and TACACS+ would do the rest by responding to every of that request's components.

4 0
3 years ago
How many bytes is a zebibyte?
frozen [14]
1 zebbibyte is 1.181e+21 bytes

I hope this helps you.
8 0
3 years ago
Read 2 more answers
Other questions:
  • When a router fails to send messages in a timely fashion, this is a problem of the _____.
    8·1 answer
  • Smartphones can have virtual keyboards or physical keyboards. What are 3 advantages and disadvantages to each one?
    13·1 answer
  • 3-d metal printing, artificial intelligence, and self-driving cars are examples of ___________.
    10·2 answers
  • What are two most common types of microcomputers? a. IBM-style PCs and Macs c. Clients and Servers b. Mainframes and Minicompute
    14·1 answer
  • What is meant by concentration of a solution​
    6·2 answers
  • Similarly, the Windows server OS can run regular workstation applications such as MS Office or Adobe Photoshop. Why is this a ba
    5·1 answer
  • What happens when your project is rendered?
    5·1 answer
  • NumA = 3 <br>numB = 2<br>Result = numA ** numB
    12·1 answer
  • write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product
    7·1 answer
  • What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of deli
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!