1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
7

The font size on presentation slides should not be smaller than _____ -point.

Computers and Technology
2 answers:
miv72 [106K]3 years ago
7 0

Answer: 24

Explanation: The audience should be able to clearly read and interpret your information.

fredd [130]3 years ago
3 0
The font size should not be smaller than 24 points.
You might be interested in
2. How is accessing the Internet through a home network and public Wi-Fi similar?​
Romashka-Z-Leto [24]

Answer: it is not the same

Explanation: via public wi-fi u can easily be hacked but your home wi-fi is yours and u are safe there

6 0
3 years ago
)
I am Lyosha [343]

Photo metadata

Hope this helps

5 0
3 years ago
Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
wlad13 [49]

Answer: d. Run a virus scan

Explanation: Running a virus scan will reveal if the trojan virus or any other malware has been launched and the clearing the virus when detected. These will make the computer to start working well again. The unexplainable processes that started when the computer was rebooted can be viruses.

8 0
3 years ago
Read 2 more answers
While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
Natasha_Volkova [10]
True because any one can change or fix their voice just by practicing a voice.
3 0
3 years ago
True or False? You should never move an injured person.<br> True<br> False
EastWind [94]

Answer:

true

Explanation:

6 0
3 years ago
Other questions:
  • What is used for World Wide Web?
    7·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • A risk handling technique in which the organization chooses to simply do nothing, as the cost of the risk being actualized is lo
    15·1 answer
  • What are the names of the 3 main languages used for making websites
    10·1 answer
  • What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
    5·2 answers
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • Services such as water, electricity, and phone communications are called:
    7·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Consider the following code snippet that appears in a subclass: public void deposit(double amount) { transactionCount ++; deposi
    14·1 answer
  • Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk st
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!