1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
9

What is a disadvantage of using transitions in a PowerPoint presentation?

Computers and Technology
1 answer:
Goryan [66]3 years ago
4 0
I would say the fourth one in my opinion because all those really heavy transitions that dissolve the whole screen or do something like the origami transition is just too much for a presentation.
You might be interested in
Which statement is true regarding bitmap images?
horrorfan [7]
<span>Which statement is true regarding bitmap images?</span>
I believe it is D

8 0
3 years ago
Read 2 more answers
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
Sergeeva-Olga [200]

Answer:

a, c, d

Explanation:

6 0
3 years ago
Read 2 more answers
How has A.I. evolved and helped humanity in recent times?
Ksenya-84 [330]

Answer:

AI has helped many people in these days.

Explanation:

With AI adoption on the rise, the technology is addressing a number of global challenges.

Artificial intelligence is being used to help crack down on illegal activities.

It is helping to tackle over fishing in our ocean.

And it is even being used to address the issue of gender imbalance.

6 0
2 years ago
Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
Naddika [18.5K]
Year = 1972
current year = 2021

while year <= current year:
print (year)
year = year + 4
8 0
2 years ago
What does spyware do on your computer?
Morgarella [4.7K]
It's a malware, and it basically let's the person/hacker/culprit get information off your computer without the owner of the computer knowing that the person is doing it. It's often used to find keystrokes, passwords, online interaction, and other personal data.
5 0
3 years ago
Other questions:
  • What of the following google tools support collaboration
    10·1 answer
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
    15·1 answer
  • What are the two types of lighting?
    7·2 answers
  • in java how do i Write a program that reads a set of integers, and then prints the sum of the even and odd integers.
    6·1 answer
  • Choose the term that matches each description.
    15·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Write an alogrithm to display the first ten even numbers​
    6·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!