1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
8

Rebecca has finished with the research and outline portion of her slide presentation now the next logical step is to begin worki

ng on what part of her slides?
Computers and Technology
2 answers:
tigry1 [53]3 years ago
8 0

Answer:

In addition to a striking <u>style and design</u>, it should be noted that if you have already done the research, it is correct to add a <u>cover, an introduction to the project and the conclusions</u>.

Explanation:

The cover contains the title of the investigation, the name of the person who made the slides and the most important information that should be attached to some slides.

The introduction is an orientation point that indicates what the work will be about.

The conclusions: it is a small summary of everything that was seen and understood about the project.

With a cover, an introduction, an investigation, a summary and conclusions, the slides would be left with everything they are supposed to have to expose them.

e-lub [12.9K]3 years ago
4 0

Answer:

The answer is creating and layout and template style

Explanation:

APEX VERIFIED just did it

You might be interested in
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Use Python programming (or Excel) to analyze and plot a real equilibrium sedimentation equilibrium experiment. The data are from
Nady [450]

Answer:The allosteric inhibitors of integrase (termed ALLINIs) interfere with HIV replication by binding to the viral-encoded integrase (IN) protein. Surprisingly, ALLINIs interfere not with DNA integration but with viral particle assembly late during HIV replication. To investigate the ALLINI inhibitory mechanism, we crystallized full-length HIV-1 IN bound to the ALLINI GSK1264 and determined the structure of the complex at 4.4 Å resolution. The structure shows GSK1264 buried between the IN C-terminal domain (CTD) and the catalytic core domain. In the crystal lattice, the interacting domains are contributed by two different dimers so that IN forms an open polymer mediated by inhibitor-bridged contacts; the N-terminal domains do not participate and are structurally disordered. Engineered amino acid substitutions at the inhibitor interface blocked ALLINI-induced multimerization. HIV escape mutants with reduced sensitivity to ALLINIs commonly altered amino acids at or near the inhibitor-bound interface, and these substitutions also diminished IN multimerization.

Explanation:

6 0
3 years ago
if the Titanic sank today , in what format would people receive or read the news? Indicate your favorable from of media format y
Diano4ka-milaya [45]

Answer:

It would hit MSM the soonest such as CNN, Fox , and all other news sources. The second that tge news got out, these news sources would dig in and find all information available and do a report on it

3 0
3 years ago
Gabe wants to move text from one document to another document. He should _____.
Lorico [155]
Copy and paste the text
8 0
4 years ago
Read 2 more answers
Microsoft s trash receptacle is called
solmaris [256]
The term that is being looked for in this problem would be most probably and most likely to be the Recycle Bin.

Microsoft's trash receptacle is called the Recycle Bin. This is where deleted files and folder are moved after being deleted. Simple selecting the file or files and pressing the delete key would prompt you to make sure that you really wanted to do this. This is a precautionary action of the computer to let you know what you are about to do. This is to make sure that errors wouldn't happen in the future since some files are highly sensitive, some programs also are, and some files are just too big for the Recycle Bin to be handled, thus they are deleted permanently.
3 0
4 years ago
Other questions:
  • What is the device that allows users to manipulate data by controlling an onscreen pointer
    5·2 answers
  • Identify the output, input, and any missing information for the following problem. George wants to find out how much extra he wi
    15·1 answer
  • What is a sloper
    11·1 answer
  • Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
    9·1 answer
  • Below is an image from Google Trends that plots Cats and Dogs. It shows a line that is higher for dogs than cats. Choose the mos
    11·1 answer
  • THE FOLLOWING IS WRITTEN IN C:
    5·1 answer
  • 2. Which of the following statements describes a need or problem that can be solved using the technology design process.
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·2 answers
  • Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
    15·1 answer
  • In my mouth In my hair..........​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!