1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
10

Why is audio greyed out on powerpoint ms office 2011?

Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
7 0
Because its a old type of software and probably wont run on your computer
You might be interested in
A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
ch4aika [34]

The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

The following information related to artificial intelligence is:

  • It refers to the human intelligence where the machines could be treated as humans and according to this, the actions should be mimic.
  • It should be used for any kind of machine where the traits should be associated along with the mind of the human-like for learning & problem-solving purpose.

Therefore we can conclude that The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

Learn more about the machine here: brainly.com/question/2555822

3 0
3 years ago
Data silos are often associated with ________________.
amid [387]

Answer:

Option b the development of one or a few related analytics applications.

Explanation:

Data silo is the isolated information in an organization which is not shared across different departments. Data silo could exist because one department in an organization may not see the necessity to share information to other department. Or the information is deemed as unique data which is dedicated  to develop one or a few very specific analytics applications.  Data silos should be minimized if an organization intends to develop a data analytics system that support in enterprise wide level.

7 0
3 years ago
A token is a special control frame that indicates to the rest of the network that a particular node has the right to transmit da
rusak2 [61]
It is true that a<span> token is a special control frame that indicates to the rest of the network that a particular node has the right to transmit data.</span>
4 0
3 years ago
What is a utility application that monitors the network path of packet data sent to a remote computer?
stepladder [879]

Answer:

"Traceroute " is the  correct answer.

Explanation:

The traceroute commands in the networking that traces the network path The  traceroute is also displaying the information about the pack delay that is sent over the internet."Traceroute is also known as tracepath it means it calculated the path between the packets in the network. Traceroute takes the one IP address of the computer machine and taking another Ip address to calculate the path between the packets.

Traceroute Is a type of utility application that monitors the network between the packet that is sent into a remote computer.

7 0
3 years ago
A teacher wants to check the typing proficiency of five students. She gives all of them the same passage to type. Which student
Hitman42 [59]

The student who uses macros for long words. They are most likely to pass words very easily because they have a macro. While not only saving time, also making a stunning performance as macros usually auto correct as well.

5 0
2 years ago
Other questions:
  • What is the recommended size for bulleted text?
    5·2 answers
  • What is one advantage of a wireless network
    14·2 answers
  • What are the primary functions of motor oil? a. Reduce friction and prevent wear b. Keep engine surfaces clean c. Remove heat to
    11·1 answer
  • Unit 3 Computer Programming Study Guide
    6·1 answer
  • ____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
    7·2 answers
  • What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat
    9·2 answers
  • A. Write a program that asks the user to enter an integer, then prints a list of all positive integers that divide that number e
    11·1 answer
  • In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?
    10·1 answer
  • Computers and Technology:
    14·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!