1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
11

The presentation ____ determines the formatting characteristics of fonts and colors.

Computers and Technology
2 answers:
leonid [27]3 years ago
6 0
The presentation theme determines the formatting characteristics of fonts and colors.
Likurg_2 [28]3 years ago
5 0
Hey there,

The theme of the presentation determines the formatting charecterísticas of fonts and colors.

Hope I helped :)

~Char
You might be interested in
Write a program that accepts a positive integer N as command-line argument, and outputs True if N is the square of some integer,
Ann [662]

Answer:

In Python:

N = int(input("Positive integer: "))

if N > 0:

   flag = False

   for i in range(1,N+1):

       if i * i == N:

           flag = True

           break

   print(str(flag))

else:

   print("Positive integer only")

   

Explanation:

N = int(input("Positive integer: "))

If the number is positive

if N > 0:

This initializes a boolean variable to false

   flag = False

This iterates from 1 to the input integer

   for i in range(1,N+1):

This checks if th number is a square of some integer

       if i * i == N:

If yes, flag is set to true

           flag = True

The loop is exited

           break

This prints either true or false, depending on the result of the loop

   print(str(flag))

If otherwise, that the number is not positive

<em>else:</em>

<em>    print("Positive integer only")</em>

3 0
3 years ago
Easy coding question, please help.
borishaifa [10]

Answers:

What is the index of the last element in the array? stArr1.length()-1

This prints the names in order. How would I print every other value? Change line 4 to: index = index +2

Change line 7 to: i < names.length

5 0
3 years ago
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
how do i create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be
valentina_108 [34]

Create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be displayed in the search results (starting in cell K10).

Explanation:

  • In cell B2, enter the value from A7.
  • Insert a function in D2 that will return the arrival date of any vehicle based on  which VIN is entered in B2 (Hint: Start with an INDEX function. Before you use a  nested MATCH function, specify which column number you will be returning.)
  • Insert a function in F2 that will return the Special Notes of any vehicle based on  which VIN is entered in B2 (Use the same hint from the previous step.)
  • Enter the following values for the advanced search criteria in the range K3S3:
  1. Year = 2018
  2. Type = Sedan
  3. GPS = Yes
  • Create an advanced filter using the search criteria in the range K2:S3 and the  inventory data where the results will be displayed in the search results (starting in  K10).
  • Verify results populate as expected.
6 0
3 years ago
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
3 years ago
Other questions:
  • By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
    14·1 answer
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————
    10·2 answers
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • A strategy to solve a logic problem is to break it into steps. Using the drop-down menu, complete these sentences about solving
    15·2 answers
  • At the aquarium Grandma Simpson hugged the dolphin is that passive or active sentence​?
    6·1 answer
  • Who was the founder of the location-sharing site Whrrl
    6·1 answer
  • A special type of loans for houses
    9·2 answers
  • What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
    11·1 answer
  • Help! Picture provided
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!