1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
15

A four-foot by six-foot touch screen is a(n) _____.

Computers and Technology
1 answer:
Katena32 [7]3 years ago
5 0
Multi-touch interface
You might be interested in
What can I play to get max points
BaLLatris [955]

Answer:

H o e! (as the gardening tool)

3 0
3 years ago
Read 2 more answers
Which statement describes what happens if multiple users make changes simultaneously to a presentation when coauthoring?
Marina CMI [18]

Answer:

3.

Explanation:

Co-authoring in PowerPoint is sharing a presentation and allowing your colleagues to work on it at the same time. This option of co-authoring is available when you share or save your file on OneDrive or SharePoint.

The perk of co-authoring a presentation is that PowerPoint keeps a record of all edits under the name of the author. This keeps the conflicts away.

Therefore, the correct answer is option 3.

8 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
What is a certificate? Select one: a. A certificate used to encrypt a message in PKI b. A method of certifying the strength of a
lozanna [386]

Answer:c)A digital document that is used to verify the owner's identity

Explanation: Certificate is termed as the digital document that helps in exchanging information or data with protection over the internet.It is used for the maintenance of authentication of user .They are provided with he username and password for the security which can be accessed by the authorized party only.

It verifies the the message sent is by the authorized user and the receiver the decrypts the message.Other options are incorrect because it does not encrypts the data rather has encrypted password and does not certify or change the key's strength .Thus, the correct option is option(c).

8 0
3 years ago
sales reps at universal containers use salesforce on their mobile devices. They want a way to add new contacts quickly and then
Mamont248 [21]

Answer:

Build a global action to create Contacts

Explanation:

Based on the information given the mobile solution that an app builder should recommend should be GLOBAL ACTION because global action enables new contact to be created quickly ,Global actions also enables the creation or update of records as well sending email, all without leaving the page the person is working on which is why GLOBAL ACTION is often recommended because it saves time.

6 0
4 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Form the recurrence relations (RRs) for the number of vertices and the number of edges of a hypercube of n dimensions, Hn. Solve
    13·1 answer
  • How would you define a relational database ?
    12·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • Rob used Track Changes to suggest changes in Jack's document. Jack agrees with some edits and disagrees with others. What should
    14·1 answer
  • What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
    13·1 answer
  • Which of the following is a function of the slip yoke used on a driveshaft?
    14·1 answer
  • 13. In cell A17, use the SUMIF function to display the total membership in 2023 for groups with at least 40 members
    15·1 answer
  • The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,OR
    15·1 answer
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!