1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
5

Why when i create a powerpoint on word it doesn't open properly in other programmes

Computers and Technology
1 answer:
wariber [46]3 years ago
3 0
Change the file name from doc/docx to ppt
You might be interested in
There u go i did thereeeeeeeeeeeeeeeeeeeeeee
Alika [10]
Awwww u cutie pie:)) thanks for showing me how to screenshot
3 0
3 years ago
Read 2 more answers
Which of the following are actions a programmer could take when debugging a segment of code that would most likely lead to findi
Verizon [17]

Answer:

Option B and C are the correct answer for the above question

Explanation:

The above question asked about the work of the programmer to catch an error of the program--

  • Then the option B states that the programmer needs to prints the value of the various program variable on every line of the program which is the correct solution because it is used to find the error easily. It defines the value of every variable in every place of the program and the programmer caught the error statement in the program if anywhere the variable gets the false value.
  • The C option states to help from a friend, it is also a good solution because the friend can easily be caught the error of the program by seeing every line of code.
  • But the other option is not correct because the option A states that the change the name of the variable which is not a result of anything.
  • And the option D states that the code will be retyped again which is also not justify anything.

6 0
3 years ago
A company has recently learned of a person trying to obtain personal information of the employees illegally according to which a
wel
This is illegal. The person responsible for this could be sent to jail for a very long time. He should also be fired. 
7 0
3 years ago
Which are two common methods a laptop uses to get an Internet connection over a cellular network?
Vikentia [17]
Wi-Fi or Tethering.
8 0
3 years ago
Which of the following statements is true regarding the e-mails that were collected from Marina and Rita's Cupcakes' key employe
Anarel [89]

Answer:

The e-mails included both professional and personal information that could be exploited.

6 0
3 years ago
Other questions:
  • Discuss your theory on why the light bulbs in the combination circuit have different brightness.
    6·1 answer
  • Operating systems that have windows and icons have which type of user interface?
    15·1 answer
  • Sort Sorts by value; assign new numbers as the keys.
    14·1 answer
  • Which command group does a user need to access the Formula dialog box?
    11·1 answer
  • Nearly all states allow citizens who are not able to go to the polls due to business travel to vote using this method: Internet
    9·2 answers
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • Which keys can be pressed to change the cuboid/frame selector color on remotasks lidar course
    6·1 answer
  • if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should yo
    6·1 answer
  • Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only t
    15·1 answer
  • A web based application that integrates html code with business logic is said to be in violation of what design principle?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!