1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
4 years ago
6

The working window of a presentation is the _____.

Computers and Technology
2 answers:
stepan [7]4 years ago
8 0
The answer would be slide
GalinKa [24]4 years ago
5 0
The answer should be 4.slide
You might be interested in
Describe one type of technology that is useful in producing images from space.
marta [7]
One technology is the telescope
8 0
3 years ago
Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?
mars1129 [50]

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

  • It loses the air and water vapor throughout the coolant point is called it.
  • The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.
8 0
3 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
The music is the soul who says this
Crazy boy [7]

Question:the music is the soul who says this

Answer: Arthur Schopenhauer

Explanation: he says music is the language of feeling and of passion

question answered by

(jacemorris04)

4 0
3 years ago
Other questions:
  • Bugs bunny personality traits
    7·1 answer
  • All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before
    10·1 answer
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note grades in each subject after the
    13·2 answers
  • Which is a good guideline to follow for adding animation to a presentation?
    12·1 answer
  • When you are using remote control services and need to enter the ip address of the system you want to control, you should use th
    6·1 answer
  • Flowcharts allow you to more easily clarify among multiple potential solutions to a problem to see which solution is best.
    5·1 answer
  • In the sentence below, identify the proofreader's marks used.<br><br>Check my answer please :)
    14·1 answer
  • Write Python code to convert miles to kilometers. This does not need to be written in a Python function, but it should use the i
    8·2 answers
  • What are some similarity's between NES console and consoles today
    14·2 answers
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!