1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
4 years ago
15

Arrange these steps of creating a presentation in the correct order.

Computers and Technology
2 answers:
koban [17]4 years ago
7 0

1. Click Create Presentation

2. Background

3. Wizard

4. Animation

Eddi Din [679]4 years ago
3 0
<h2>Answer:</h2>

The correct arrangement of steps is as follow:

Click Create Presentation.

↓

Select the Template option from the Presentation Wizard.

↓

Select the background of your slide show.

↓

Assign animation to your slide.

<h3>Explanation:</h3>
  • First of all you have to open the software of power point. Then click on create new ppt.
  • After that you have to choose a template like blank page, into page or simply content page with one topic.
  • Then you chose a colored back ground of slides, it can be of your choice or defaults in software.
  • After making complete slide you give the animation to slides.
You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
When you open a program, the hard drive___
Papessa [141]

Answer:

When you open a program, the hard drive <u>Registers the program and runs the program accordingly. </u>

I hope this helped!

3 0
3 years ago
Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically? A. Focus B. Sweep
irga5000 [103]
The answer is A Focus hope it helps
7 0
3 years ago
Read 2 more answers
Which two features could be added to a game using an "if () then" block?
xxTIMURxx [149]

The two features that could be added to a game using an "if () then" block are c. if the player touches a wall, it turns around and moves back 5 and d.

<h3>What does the If Then block mean?</h3>

The If-Then block is understood to be the output certainly considered one among given values, this is because of the fee of a Boolean enter.

Note that the entry fee could be very essential and as such, The functions will be introduced to a sport the use of an "if () then " block are: Using nested If-Then blocks. • Checks the particular Bid amount for the instrument.

Learn greater approximately game from :

brainly.com/question/1786465

#SPJ1

3 0
2 years ago
How people select, interpret, remember, and use information to make judgments and decisions is called __________.
Svetradugi [14.3K]

Answer: Social Cognition

Explanation: hope this helps

6 0
4 years ago
Other questions:
  • Using the flowchart diagram, identifythe decision point of this solution?
    6·1 answer
  • It is an attribute that must be used in the form tag in specifying an input file type
    9·1 answer
  • which telecommunications service allows internet and telephone service to work over the same phone line
    13·1 answer
  • Write a Java program in jGRASP that creates a 2D integer array of 5 rows and 20 columns, fills it with increasing integer values
    13·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • Does -8 = -21?<br>[this is NOT a trick question]<br>Yes....?<br>No!​
    12·2 answers
  • I need help also this counts as my second giveaway and last for today
    12·2 answers
  • Einstein's famous equation states that the energy in an object at rest equals its mass times the squar of the speed of light. (T
    6·1 answer
  • With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
    14·1 answer
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!