1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
5

Hen using presentation software, what do you do when you "compose a slide"?

Computers and Technology
1 answer:
Tamiku [17]3 years ago
7 0

Answer:

using Microsoft power point .

Explanation:

Start by opening a "Blank presentation" in PowerPoint. ...

Select the "Title Slide" option. ...

Type in your title and subtitle. ...

Select a background for the entire presentation. ...

Add new slides. ...

Set the transitions for your slides. ...

Add some more pizzazz to your presentation with animation!

You might be interested in
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
2 years ago
Identify the modern-day printmaking process, also known as screenprinting, in which the artist squeegees paint through a mesh sc
aliya0001 [1]
Serigraphy is another word for this!
5 0
3 years ago
Which of the following is a type of monitor port?
Soloha48 [4]
B. all of those.

just to clarify,
HDMI is the port for monitor and sound.

VGA is for video/monitor port
and display port.... I don't know, but it's a type of monitor port.
7 0
3 years ago
A software EULA is an agreement related to which of the following?
densk [106]

A software EULA is an agreement related to the terms of use of the software

the terms of use of the software

<u>Explanation:</u>

EULA stands for End User License Agreement. It can be defined as an agreement related to the terms of use of the software. EULA provides the user with all the details and any restrictions that have been imposed on the application by the developer.

In order to use the software, the user has to agree with all the terms and conditions specified in the EULA. The most common restriction imposed on an application/software is that it shouldn't be shared with anyone, in proprietary software.

7 0
3 years ago
Read 2 more answers
etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in clo
jeka94

Answer:

"Inline" is the correct answer.

Explanation:

  • Network behavior analysis (NBA)  or Analysis of network activity seems to be the technique to observe traffic trends that aren't groups or sets throughout the cable network's everyday traffic.
  • Simplest terms, this is the organization's effort to define network anomalies outside pure congested traffic expect a seamless.

So that the above is the correct answer.

6 0
3 years ago
Other questions:
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • Assume you have a int variable n that has already been declared and initialized. Its value is the number of integers that need t
    13·1 answer
  • True or false there is no relationship between the purpose of the page and the page quality
    13·1 answer
  • A foreign exchange student brought his desktop computer from his home in Europe to the United States. He brought a power adapter
    9·1 answer
  • which feature of organisations to manage needs to know about to build and use information system successfully
    6·1 answer
  • Which of the following will print I'VE GOT THIS on the screen? (5 points)
    14·1 answer
  • Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
    11·1 answer
  • Question 1
    8·1 answer
  • National ISPs usually offer fewer services and have a smaller technical support staff than regional ISPs.
    13·1 answer
  • 1)What is the hydropower resources/energy?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!