1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
15

If you type too much text on a PowerPoint slide the additional text is _____

Computers and Technology
1 answer:
IrinaK [193]3 years ago
3 0
The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.
You might be interested in
Which two components help input data in a computer and select options from the screen, respectively?
Natali [406]

Answer:

Mouse and Keyboard are the devices which can be used to give input to the computer.

Explanation:

Mouse and Keyboard both are connected with the CPU via USB cable. Mouse consists of 3 major buttons, left button(for click to get the task to be done), right button (to get options) and wheel (to scroll up and down the page on screen). Keyboard is use to type text and letters as per need.

3 0
3 years ago
Rules that govern how to communicate online are known as etiquette. netiquette. Internet laws. computer rights.
azamat

Answer:

Explanation:

i think it might be netiquette

7 0
3 years ago
Read 2 more answers
What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
Rudik [331]

Answer:

FULL neighbor state.

(FULL/DR or FULL/BDR)

Explanation:

The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.

Here is an example:

R1#show ip ospf neighbor

 

Neighbor ID   Pri         State               Dead Time     Address      Interface

 

203.250.12.1    1     2WAY/DROTHER  0:00:37   203.250.14.3  Ethernet0

203.250.15.1    1     FULL/DR                0:00:36   203.250.14.2  Ethernet0

203.250.13.41  1     FULL/BDR              0:00:34   203.250.14.1  Ethernet0

5 0
3 years ago
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
inn [45]

Since after update of operating system patches the end user see dots in black screen, either end user has to restore operating system old back up if he or she has or boot the operating system in safe mode.

<u>Explanation:</u>

On safe mode end user can repair the operating system; in repair mode still operating system cannot repair the operating system on same safe mode uninstall patches or recent updates of operating system during vacation.

Still it is workstation or laptop or desktop is not restoring it normally better to format and reinstall the operating system.

6 0
4 years ago
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
Other questions:
  • <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="225547404f435156475062404e434c4947560c414d4f">[email&#1
    12·2 answers
  • 2. What does the "Users" metric measure?
    10·1 answer
  • Choose the correct statements about computer-programming languages. Choose all that apply.
    8·2 answers
  • Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!
    10·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • Need to know? Anyone feel like helping me not fail
    13·1 answer
  • Analyze the sentence below . choose your answer on the box below write your answer in your quiz notebook
    5·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
  • Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false q
    7·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!