1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
14

Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr

esentation, she should open the Equation .
Computers and Technology
2 answers:
Alika [10]3 years ago
7 0

If anyone is still wondering it's the Equation Editor

Alex73 [517]3 years ago
4 0
The mathematical operations/symbol/formulae can be inserted into MS powerpoint using equation editor. Just follow these steps:
1)click on the Insert
2) Select Object from the list
3) Select Equation Editor from the list and the dialog box of equation editor will open up. Now, write, edit your equation in this box. When you return back to powerpoint slide, the equation will come on the current slide, you are working on.
You might be interested in
A program is expressed in a programming language. Whiat is true of the program?
zalisa [80]

Answer:

The answer is "The program can also be expressed as a binary code, but it is easier for people to understand when it is expressed in a higher programming language".

Explanation:

In the given question some details are missing that is options of the question that can be given as follows:

A. The program can also be expressed as a binary code, but it is easier for people to understand when it is expressed in a higher programming language.  

B. The program can also be represented as a binary code that reduces the likelihood of errors.  

C. Binary code can not be used for binary code, because binary code can only represent data.  

D. Some parts of the program, however, should be printed in a higher-level language for the operation.  

The computer knows the only binary language, It is a form of 0 and 1, but this language can't be understood by the user. It will convert into high-level language, that is understood by the user, that's why this option is correct.  In which accepts of option A, all options are wrong that can be described as follows:

  • In option B, It is wrong, because the user may not understand binary language, and he can also be writing some wrong code that is converted in binary code, that will increase error.
  • In option C and option D, is incorrect because all the data that is stored in the computer is in the form of binary code.

4 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
Slav-nsk [51]

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

brainly.com/question/4264949

#SPJ1

8 0
2 years ago
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
2 years ago
Bends are made in pvc conduit using a tool known as a
USPshnik [31]
The answer is C) heater box
8 0
3 years ago
Read 2 more answers
Why is it grey? i recently dropped it , the switch is on!
iragen [17]

Answer:

because it is what it is

7 0
3 years ago
Other questions:
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • 4 types of system software
    10·2 answers
  • Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
    15·1 answer
  • What happens of the gamers dont follow the age ratings
    14·2 answers
  • Super easy question but you have to think about it because it’s not that easy I’ll mark brainliest for first answer Explain the
    11·1 answer
  • What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other
    6·1 answer
  • In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.
    14·1 answer
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • How serious are the risks to your computer security?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!