1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
11

5 programas más utilizados para realizar presentaciones electrónicas

Computers and Technology
1 answer:
Alchen [17]3 years ago
3 0

Answer:

Google Slides

Microsoft PowerPoint

Visme

Prezi

Slidebean

You might be interested in
You would like the word "Employee" to appear in cells A1, B1, C1, D1, and E1. To be efficient, you should
Agata [3.3K]

Answer: type the label in A1 and use autofill

Explanation:

Took the final 2021 Edgeunity

6 0
3 years ago
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
A thesaurus is an example of a(n)
Ivahew [28]

Answer:

D. online reference

Explanation:

An "online reference" refers to a<em> digital reference</em> that end users may utilize for their work or other daily activities. For example, if a person is looking for the <em>synonym of a particular word,</em> she may then refer to the thesaurus.

A blog is a website where you can find personal journals from different writers.

An e-book is an <em>"electronic book."</em> This allows people to read book digitally.

An e-zine is an<em> "electronic magazine." </em>This is a magazine in its digital form.

3 0
3 years ago
Read 2 more answers
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
What type of computer is an ATM attached to ?
nignag [31]
ATM machine uses a CPU to control the user interface and transaction devices

If this doesn’t help lmk I can add something else
5 0
3 years ago
Other questions:
  • Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, whi
    8·1 answer
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
    7·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • For this assignment you must do the following tasks in order: (1) START EARLY. (2) READ THE ASSIGNMENT MULTIPLE TIMES to underst
    13·1 answer
  • How does the OS make multitasking possible?
    12·2 answers
  • Explain the difference between good and bad table structures. How do you recognize the difference between good and bad structure
    14·1 answer
  • Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with busine
    9·1 answer
  • Which statement is false? Select one: a. Function printf does not care how large the array it is printing is. b. Function scanf
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!