1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
4 years ago
10

In presentation software, what is the way that text and pictures are arranged on a page called?

Computers and Technology
1 answer:
ankoles [38]4 years ago
5 0
The correct answer is Layout.
You might be interested in
PLEASE ANSWER THIS ASAP‼️
Reil [10]

c) the grasses

plants are producers

4 0
3 years ago
Read 2 more answers
_______________ bytes of storage are needed to represent the name "sarah." two three five ten
Sholpan [36]
The answer is five...
4 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
kumpel [21]
The email should be lighter but they're variables such as the word processing program. Not sure if this answered your question.
6 0
4 years ago
Read 2 more answers
Whats the recommended amount of dedodated wam<br>i can have in a server
Scorpion4ik [409]
Hi! The recommended amount of RAM that you should have is 6gb and above.
5 0
4 years ago
Other questions:
  • How to ask for a letter of recommendation via email?
    10·1 answer
  • What can be used to describe and document the analysis and design of complex software systems?
    14·1 answer
  • Which of the following techniques has to do with how the people who make the commercial manipulate the way it looks?
    8·1 answer
  • Why is it important to explore an Integrated
    13·1 answer
  • Name the different tools used byMMDB.
    14·1 answer
  • What are computers used for?
    14·2 answers
  • How do i get rid of pop ups??
    9·2 answers
  • I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault
    12·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • What are the 3 dimensions referenced when we say 3D?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!