1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

Speakers wanting to control the movement of one slide to the next choose this option.

Computers and Technology
1 answer:
aleksklad [387]3 years ago
6 0
Change slides by clicking on background.
You might be interested in
(tco 9) the most common protocol(s) used for sending and retrieving e-mail is(are) _____.
Readme [11.4K]
SMTP = Simple Mail Transport Protool
5 0
4 years ago
2.3 Code Practice: Question 3
Tpy6a [65]

Answer:

Code in C++

Explanation:

C++ Code

#include<iostream> //for input and output  

using namespace std;  

int main()  

{  

  int hour;

  int minute;

  cout<<"Enter the hour:";

  cin>> hour;

  cout<<"Enter the minute:";

  cin>>minute;

  minute = minute+15;

  if(minute>=60){

   hour++;

   minute=minute-60;

  }

  if(hour>=24){

   hour=0;

  }

  cout<<"Hours: "<<hour<<endl;

  cout<<"Minutes:"<<minute;

  return 0;  

}

Code Explanation

First we need to declare two int variables to hold hour and minute values input from user.

Check if by adding 15 minutes into minute entered by user is greater then or equal to 60 then increment into hour and subtract 60 from minute.

Another check is that if user enters more then 24 hour or by making increment into hour, the hour values i greater then or equal to 24 then we need to change the hour to 0.

Result

Case 1:

Enter the hour:8

Enter the minute:15

Hours: 8

Minutes:30

Case 2:

Enter the hour:9

Enter the minute:46

Hours: 10

Minutes:1

8 0
3 years ago
PLEASE HELP ME! Sam was researching rocks and minerals. He thought the Web site looked unprofessional, so he looked for the auth
tiny-mole [99]

Answer:

B

Explanation:

If a site looks unprofessional and doesn't have any credentials, those are two signs that it's probably not very reliable.

7 0
3 years ago
The physical components of information technology, which can include the computer itself plus peripherals such as storage device
yarga [219]
The correct answer should be Hardware
8 0
3 years ago
How do you become a hacker? Is there any good websites? Where do you begin? Preferably a white hat.
4vir4ik [10]
I suggest learning and studying technology and the way a computer or a phone works and how it receives info. That way, you will be able to give the device something it won't handle...... I think....
3 0
3 years ago
Other questions:
  • List and describe the three types of cloud models described by Microsoft.
    9·1 answer
  • Is an application that creates electronic worksheets composed of rows and columns?
    7·1 answer
  • When designing a website, describe 3 best practices you would give to your fellow classmate on effective web design that will ma
    9·1 answer
  • Using illustration how input, process and output in latest wearable devices
    10·1 answer
  • to minimize wrist injury switch frequently among touch gestures the keyboard and the mouse true or false
    15·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • Cuantos puntos de habilidad se puede tener en clubes pro?
    9·1 answer
  • 1. State three types of web protocols​
    14·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
  • which command entered without arguments is used to display a list of processes running in the urrent shell
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!