1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
13

How many slides are present in a blank presentation

Computers and Technology
2 answers:
Kobotan [32]3 years ago
8 0
One, right? Because there's just the blank title slide that automatically pops up. 
katrin2010 [14]3 years ago
5 0

Answer:

One slide

Explanation:

A blank presentation Is a blank slide that has a white background and black text with layout for text and graphics. When opened, a slide featuring a title and subtitle appears by default, you can either start your presentation with this slide or choose a new one to match your presentation use.

You might be interested in
What is the “data” in an SRS's data flow diagram?
mezya [45]

Answer:

a is the answer

pa brainliest po

7 0
2 years ago
a.) Software architecture is the set of principal design decisions about a system. b.) Software architecture dictates the proces
Shtirlitz [24]

Question:

Which of the following statements is not a true statement about software architecture?

Answer:

b.) Software architecture dictates the process used by a team to develop use cases for a software system.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

One of the most important steps in the software development life cycle (SDLC) is design. It is the third step of SDLC and comes immediately after the analysis stage.

Basically, method design is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

Software architecture can be defined as the software blueprint or infrastructure in which the components (elements) of the software providing user functionality and their relationships are defined, deployed and executed. Thus, it is a structured framework used by software developers to model software components (elements), properties and relationships in order to have a good understanding of how the program would behave.

In conclusion, software architecture doesn't dictate the process used by a team to develop use cases for a software system.

6 0
3 years ago
Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?
iris [78.8K]

Answer:

$1A

brainiest plz

Explanation:

The elements of a formula only can have the following format:

1) Letter Number as C1

2) Letter $ Number as A$1

3) $ Letter Number as $A1

4) $ Letter $ Number as $A$1

The element $1A is not in the format

5 0
3 years ago
Read 2 more answers
Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25)
kvasek [131]

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

7 0
3 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
4 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • Chunking is a good strategy for completing large assignments because it makes the work
    15·1 answer
  • Which of the following is considered both an input and output peripheral?
    10·1 answer
  • A digital device Select one: a. uses electricity to run it. b. uses symbolic representations of data in the form of code. c. req
    7·1 answer
  • What are the advantages of technology ​
    14·1 answer
  • What movie would be greatly improved if it was made into a musical?
    6·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • Devices that allow for the retention of data when your computer has been shutdown
    10·1 answer
  • When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
    6·1 answer
  • Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!