1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
10

How do I do a PowerPoint

Computers and Technology
2 answers:
kirill115 [55]3 years ago
4 0
It is like this: . You just put a circle and that is a power point
gayaneshka [121]3 years ago
3 0
Go to office.com or if you prefer Apple, iCloud.com. Click PowerPoint or on iCloud, Keynote. Both will walk you though how to create slides. I recommend iCloud.com.
You might be interested in
Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
madam [21]

Answer:

Anti-Forensic Techniques.

Explanation:

Anti-Forensic Techniques are thsoe techniques used to deviate the Forensic tools by injecting fake informations, hiding information, planting bugs, editing or erasing information, rendering it impossible to recover the data. It is a criminal way of hacking approach that restrains Forensics to find the hackers.

Anti-Forensic tools and techniques works in oppose to the Forensic tools and techniques that tries to recover the data, locate the hacker.

Thus the correct answer is anti-forensic techniques.

3 0
3 years ago
Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
galben [10]

Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.

a)retrieval. b)comparison. c)storage. d)exponentiation.  

Answer:

a)retrieval.

Explanation:

A retrieval operation simply means obtaining data or information that is stored in a system.

Therefore, getting the data of a video file from a flash drive is a retrieval operation because it brings the video file from the storage device.

3 0
3 years ago
Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computi
laila [671]

Answer:

p(x,n)

1. if(n==0)    [if power is 0]

2.    then result =1.

3.else

4. {    result=1.

5.      for i=1 to n.

6.          {  result = result * x. }  [each time we multiply x once]

7.       return result.

8.  }

Let's count p(3,3)

3\neq0, so come to else part.

i=1: result = result *3 = 3

i=2: result = result *3 = 9

i=2: result = result *3 = 27

Explanation:

here the for loop at step 4 takes O(n) time and other steps take constant time. So overall time complexity = O(n)

6 0
4 years ago
Consider a classful IPv4 address 200.200.200.200? What is its implied subnet mask? If we take the same address and append the CI
topjm [15]

Answer:

a. 255.255.255.0 (class C)

b. 255.255.255.224

Explanation:

Here, we want to give the implied subnet mask of the given classful IPV4 address

We proceed as follows;

Given IPv4 address: 200.200.200.200

Classes

Class A : 0.0.0.0 to 127.255.255.255

Class B: 128.0.0.0 to 191.255.255.255

Class C: 192.0.0.0 to 223.255.255.255

Class D: 224.0.0.0 to 239.255.255.255

so 200.200.200.200 belongs to Class C and it's subnet mask is 255.255.255.0

In CIDR(Classless Inter Domain Routing)

subnet /27 bits means 27 1s and 5 0s. so subnet

i.e 11111111.11111111.11111111.11100000 which in dotted decimal format is 255.255.255.224 .

4 0
3 years ago
What is another name for mesolithic age
Romashka-Z-Leto [24]
In archaeology, mesolithic is culture between paleolithic and neolithic. The term "Epipaleolithic" is often used for areas outside northern Europe, but was also the preferred synonym used by French archaeologists until the 1960s.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Talking to a friend _____.
    5·2 answers
  • The Internet may best be compared to a/an
    8·1 answer
  • "Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f
    6·1 answer
  • A flat-panel detector is exposed with nothing between the x-ray tube and detector. 5 images were acquired on 5 different days us
    6·1 answer
  • what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
    5·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
    7·1 answer
  • What is the purpose of the "time-to-live" (TTL) field of the IPv4 packet? a. ensures that the packet remains in the network long
    6·1 answer
  • Which type of image format is constructed using proportional formulas rather than pixels? This task contains the radio buttons a
    12·2 answers
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!