1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
13

Describe how to manipulate artwork in a presentation.

Computers and Technology
1 answer:
natta225 [31]3 years ago
7 0
Do you mean how to add clipart to a powerpoint ? If that's what you mean then open the powerpoint presentation you will add the clip art to. Click the "insert" tab and select clip art from the images group. A clip art pane will appear. Enter the keyword of the clip art you will insert in the search for field.
You might be interested in
Where does the oracle11g server store information about objects in the database, including information about constraints?
tiny-mole [99]
The oracle11g server stores information about objects in the database, including information about constraints in the tables.  <span>An </span>Oracle database is a set of files that store Oracle data in persistent disk storage.<span>A database </span>instance<span> is a set of memory structures that manage database files</span>.
4 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Can someone please please please help me!
vova2212 [387]
Is that apologetics?

5 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
Other questions:
  • How many buttons does a gamecube controller have?
    7·1 answer
  • If you sort by Last Name, Ascending, which of the following last names would come first in the list?
    12·1 answer
  • What happens when a computer gets a virus?
    6·2 answers
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • Which operating system (OS) is used to run your laptop?
    15·2 answers
  • 9. Select the correct answer.
    6·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    9·1 answer
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
  • Simon would have regarded with impotent fury the disturbance between the North and the South, as it left his descendants strippe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!