1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
12

What special effect is needed to put the american flag as the background in google slides

Computers and Technology
2 answers:
AURORKA [14]3 years ago
6 0
Graphics because it includes pics
alexandr402 [8]3 years ago
3 0
A) or B) not sure for sure.... Hope it helps

You might be interested in
Write a program in java to enter a character.The program displays the message "uppercase vowel" if entered character is uppercas
horrorfan [7]

Answer:

d

Explanation:

i think

3 0
3 years ago
Nicotine us a dangerous chemical found in Cigarettes; it is accompanied by two other very harmful chemicals. These are
NNADVOKAT [17]

Answer: Carbon Monoxide and Tar.

4 0
3 years ago
The definition of network is:
kondaur [170]

\text{Hello there!}

<u>Networks were originally used as a government weapon 61 years ago</u> to <u>communicate information</u> such as data and research. However, individual networks were eventually discontinued by the government and made open to the public to use for things such as PAN, LAN, MAN, WAN, SAN, and so on.

<u>Our internet today is capable of communicating with bilions of computers.</u> This is possible due to your modem using radio wave-like speeds to connect to your ISP. Your ISP then connects to a larger network, which is connecting to thousands of other networks. You see, <u>the internet is just a large network of networks that are connected through very fast radiowaves</u>. However, it is not just a single network being used anymore; it's thousands of them. The term, "internet" was used to describe this large selection of networks. In short, <u>B</u><u> would be incorrect. </u>

The worldwide web is a protocol used by the internet to connect to select websites favourably from whoever's using it. This obviously would not define the network, as this is something that's used by it. Furthermore, <u>A</u><u> would not be correct.</u>

As described already, the network was a selection of computers used to communicate information to each other. <u>C </u><u>would not be correct </u>as it states that there is only one computer being used.

\fbox{Therefore, D would be the correct answer.}

\rule{300}{1.5}

6 0
3 years ago
Write the code to compute and output how many times the value 99 is found in an array of integers named numbers
astraxan [27]
Thank you for being the rare question where you actually provide what language you want your answer in; I approve, and encourage this.

In Java, the following will work.
I made it a bit more versatile to work with others numbers, other than 99, if you so please (if not, just hardcode the 99 in yourself).

// Example list - fill this with numbers yourself.
ArrayList<Integer> nums = new ArrayList<>();
int n = 99;
int count = (int)nums.stream().filter(i -> i == n).count();
System.out.println(n + " occurences.");
8 0
3 years ago
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
2 years ago
Other questions:
  • Why does people that gets abused not report?
    5·1 answer
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • Microcomputers, different from those giant mainframes and supercomputers, are designed for individuals. In fact, the microcomput
    7·1 answer
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • Your team has provisioned an Auto Scaling Groups in a single Region. The Auto Scaling Group at max capacity would total 40 EC2 i
    14·1 answer
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
  • Which of the following Access objects provides a user-friendly data entry method?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!