1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
4 years ago
11

Marco is ready to create his first slide. He wants to put the title of the

Computers and Technology
1 answer:
klemol [59]4 years ago
3 0

Answer:

Title Slide

Explanation:

Marco should use the "Title Slide" pre-set layout template to make minimal sizing adjustments. Because as you can in attachment, Title slide pre-set layout allow Marco to put the presentation title and the date of the training.

Why not other options?

  • Blank

While in the Blank slide, Marco can't add title and date to slide because, in the blank slide layout, he needs a lot of work to do size adjustment for adding title and date.

  • Title only

Title only pre-set layout allows you to add the only title. If Marco, select this option, then he needs to add a text box for date and do size adjustment also.

  • Title and Content

This pre-set layout allows Marco to add title and date in the slide but does not look good. because this pre-set layout allows you to add slide title and then related content in the content area such as image, graphs, media, and text, etc. however, this pre-set is not good for the Marco requirement.

You might be interested in
Different between client server architecture and peer to peer architecture​
Vilka [71]

Answer:

In Client-Server Network, Centralized server is used to store the data.

8 0
3 years ago
a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a
solong [7]

Answer:

where are the step number. I can't find any

6 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
1. Declare two dimensional double array with 3 rows and 4 columns. a) Use scanf to read the elements for this array. b) Write a
Kobotan [32]

Answer:

Following are the program in the C Programming Language:

#include <stdio.h> //header file

float avgs(int a[3][4]){ //define function

 int s =0, c=0; //set integer type variable

 float avg=0;   //set float type variable

 //set for loops to find sum of an array

 for (int i = 0; i < 3; i++){

   for (int j = 0; j < 4; j++){

   s = s + a[i][j];

   c +=1;

   }

 }

 //find average of an array  

 avg = s / c;

 return avg;

}

int min(int a[3][4]){//define function

 int m = a[0][0];  //set integer type variable  

 //set for loop for traversing

 for (int i = 0; i < 3; i++)

 {  for (int j = 0; j < 4; j++){

     if(m > a[i][j])

       m = a[i][j];

   }

 }

 return m;

}

int main(){//define main function

 int a[3][4];//set integer type Array

 printf("Enter the elements of an array:\n");

 for (int i = 0; i < 3; i++)

  for (int j = 0; j < 4; j++)

     scanf("%d", &a[i][j]);

 printf("\n Average of an array: %f", avgs(a));

 printf("\n Smallest element of an array: %d", min(a));

 return 0;

}

Explanation:

Here, we define header file "stdio.h" for print or scan the data.

Then, we define float type function "avgs()" for find the average of an array inside it.

  • we set two integer type variable for sum and count
  • we set float type variable to store average of an array
  • we set the for loops for the sum of an array.
  • we divide sum from count to find average and return it.

Then, we define integer type function "min()" to find the minimum value of an array.

  • we set integer type variable to store array elements
  • we set the for loops for traversing the array
  • we set if statement to find minimum value of an array.
  • we return the minimum value of an array.

Then, we define integer type "main()" function to call both the functions.

  • we set integer type array variable and get input from the user in it with the help of for loops.
  • we call both the functions with message and return 0.

8 0
4 years ago
Label provides the code that executes if no case label is matched ​
Ratling [72]

Answer:

In c/c++ it is <em>default</em>

7 0
3 years ago
Other questions:
  • 5) How have the wireless web and peer-to-peer networking helped small businesses compete with large corporations?
    15·2 answers
  • Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
    14·1 answer
  • Unlike images, tex and hyperlinks, vidoes _____ A) are playable in source view B are not used to affect user's emotions C) can b
    15·1 answer
  • The media is a phase that people often use to refer to:
    6·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • Read the following code:
    6·1 answer
  • Most widely used insulator for splices of smaller wires
    13·1 answer
  • If anyone can help me and get this correct I will literally venmo you and give brainliest
    5·1 answer
  • How to add up multiple user inputs for example: If i ask the user How many numbers do you want to add? they say 5 then i out put
    7·1 answer
  • What is e banking effects
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!