1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
4 years ago
15

How do i add a header or footer to powerpoint presentation

Computers and Technology
1 answer:
BartSMP [9]4 years ago
7 0
When you have you presentation open, go to Insert > Header & Footer.

You might be interested in
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
What method does a GSM network use to separate data on a channel?
Sergeu [11.5K]

Answer: TDMA(Time division multiple access)

Explanation: Time-division multiple access is the method that is used by GSM(Global system for mobile communication) usually for the separation process of the data.It is a way in which a same frequency is shared by different time slots of signal.It has high flexibility and so thus is helpful for the GSM network and provides easy services of division.It divides the data according to the time period slots in a GSM network.

4 0
3 years ago
Procter &amp; Gamble regularly monitors trends and information posted about their products and brands by consumers on several We
Shkiper50 [21]

Answer:

The correct answer to the following question will be "Web tracking".

Explanation:

This is indeed a business operation to keep an eye on the subscribers or visitors to the business. So what web trackers do is much more than that. They check up on your web activity.

A tracker generally seems to be a database script programmed to extract sets of data on your interests and how you are when you communicate through their database.

There are four types of Web trackers such as:

  • Embedded scripts.
  • Cookies.
  • Finger printers.
  • Supercookies.

3 0
3 years ago
Write a python program stored in file extra_credit.py that takes three different inputs from the user where : First Input: The p
LUCKY_DIMON [66]

Answer:

Check the explanation

Explanation:

print("************************************************************")

sentence = input("Enter a sentence : ").split()

replace_words = input("\nEnter the words that should be replaced : ").split()

special = input("\nEnter the replacing special Character : ")

result = []

for word in sentence:

   if word not in replace_words:

       result.append(word)

   else:

       result.append(special * len(word))

result = ' '.join(result)

print("\nThe Sentence with words censored is : " + result)

print("************************************************************")

4 0
3 years ago
Other questions:
  • What do you think is the most effective way to ensure that code adheres to good coding standards? (1 correct answer)
    5·2 answers
  • The n modifier after the tilde forces the index variable to expand only to the ______
    15·1 answer
  • In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
    9·1 answer
  • What does a column represent in a chart?
    13·1 answer
  • 10^4+10-2=<br>10^4+10-2=
    12·2 answers
  • Darian has a gourmet cupcake business and needs a website to compete with the other bakeries in his area. He has a Google My Bus
    15·1 answer
  • While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
    13·1 answer
  • Can someone help me with my homework?
    7·1 answer
  • An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________
    8·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!