1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
6

Carline is a teacher who uses PowerPoint. She wants to make sure all of her PowerPoints are set up the same way with the same th

eme. She saved her original theme for the first chapter. She is working on chapter 2. Which lists the correct steps for recovering her theme?
HELP ASAP!
Computers and Technology
1 answer:
Blizzard [7]3 years ago
7 0

Answer:

Click on file, select New, select themes and find saved theme

You might be interested in
For how long should a media piece hold the user's attention?
Nastasia [14]

Answer:

C) until the message has been communicated

5 0
3 years ago
Read 2 more answers
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Which component is a part of the CPU of a computer
Marina CMI [18]
Is a piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system.
Hope it helps!!
6 0
3 years ago
Read 2 more answers
A leading global vendor of computer software, hardware for computer, mobile and gaming systems, and
V125BC [204]

Answer:

Microsoft

Explanation:

5 0
2 years ago
What's the inputs and outputs in a kitchen?
SashulF [63]
I really don't know...
6 0
3 years ago
Other questions:
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    10·1 answer
  • Adding a ____ to text adds depth and helps the letters display prominently.
    5·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    7·2 answers
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • In java
    6·1 answer
  • Which of the following is not a data visualization technique?
    6·1 answer
  • How did the ENIAC change computing?<br> how did the eniac change computing
    14·1 answer
  • You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
    13·1 answer
  • Differentiate between patent and copyright.
    6·2 answers
  • A successful entrepreneur is
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!