1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
14

Reading view is similar to ____ view because each slide displays individually, but the slides do not fill the entire screen.

Computers and Technology
1 answer:
Akimi4 [234]3 years ago
7 0
Reading view is similar to (SLIDE VIEW) because each slide displays individually, but the slides do not fill the entire screen.
Slide view is the presentation of images or data in a projector screen that makes it bigger and visible.
You might be interested in
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
Natasha2012 [34]

Answer:

share level security model not required password for file share

Explanation:

The Common Internet File System ( CIFS ) formerly name is ( SMB ) a server message block    

it is develop by IBM and Intel for message based protocol

and there are 2 type authentication that are share level and user level

and in share level connection not required authentication

so its share level security model not required password for file share

 

7 0
3 years ago
Which of the following declares an abstract method in an abstract Java class?
slava [35]

The option that declares an abstract method in an abstract Java class is  option(B.) public abstract void method().

<h3>In Java, are abstract methods compatible with abstract classes?</h3>

Class and method abstraction is when Objects cannot be created using the abstract class, which is a restricted class. In addition to not having a body, an abstract method is only applicable to abstract classes. Subclasses provide the body.

Hence, consists of only the method definition and not any implementation. An Abstract Method is a method that doesn't have a body. A class that is abstract must declare it. Due to the need for the abstract class to implement each abstract method, the abstract method can never be considered final.

Learn more about abstract method from

brainly.com/question/15684705
#SPJ1

8 0
1 year ago
Rick is linking different pages in his website. Match the value of the attribute to its meaning to enable Rick to choose the mos
lbvjy [14]

Answer:

4

Explanation:

pretty sure it's 4 hope this helps you

6 0
3 years ago
The following is true about SPAM ________.
aev [14]

Answer:

a, c, and d.

Explanation:

Let's examine these options:

a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.

c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.

d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.

8 0
3 years ago
Why are open standards important in the data communications industry?
IrinaK [193]

They enable interoperability between software and hardware from different vendors.

5 0
3 years ago
Other questions:
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • One main advantage of CD-ROMs is that..
    7·1 answer
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • Write a python program that requests a word (with lowercase letters) as input and translates the word into pig latin. The rules
    15·2 answers
  • No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol mus
    11·1 answer
  • If tech is smarter than us. How did a human make something smarter than him/her?
    9·2 answers
  • Help please
    13·2 answers
  • How do I keep my computer and data safe and secure while using the Internet?
    14·2 answers
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • an existing technology that would allow users to transfer images from the camera to the computer without connecting them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!