1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
14

What does PowerPoint display when you use the Notes Page view?

Computers and Technology
2 answers:
Paladinen [302]3 years ago
7 0
D wow really a 7 years old know that jk
Vikentia [17]3 years ago
5 0
The answer is C, all the notes for all the pages, arranged in sequential order. 
You might be interested in
A serial schedule:
Lina20 [59]

Answer:

B)

Explanation:

Is alwayd sorted sequentially in aceding order by transaction ID

6 0
3 years ago
Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student
sergeinik [125]

Where are the students name we can’t answer a question without all the main parts everyone knows that

7 0
3 years ago
Read 2 more answers
Which object waits for and responds toan event from a GUI component?
irakobra [83]

Answer:

The answer is action eventlistener

Explanation:

It is an event handler and it is easy to implement.In java we call them even listeners it is function or a sub routine or a procedure that waits for an event to occur and respond to an event from a GUI component.

8 0
3 years ago
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
Why should characters be avoided in file names
LiRa [457]
To ensure they're translated properly on other operating systems.
7 0
3 years ago
Other questions:
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • In Excel, what happens to the cell contents when you click and drag a cell into multiple cells?
    14·1 answer
  • Computer program allowing the computer to communicate<br> with a hardware device
    13·1 answer
  • The flynn effect best illustrates that the process of intelligence testing requires up-to-date ________
    14·1 answer
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • Only need help on f and correct me if im wrong for the other questions please
    11·1 answer
  • 1.<br>is the office industry leader at the moment.​
    9·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • The following Python statement instructs the program to open a file for input.
    9·1 answer
  • A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence known a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!