1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
5

To edit the text in a SmartArt graphic, what must be done first?

Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
3 0
You have to go to where you first began the SmartArt then click on it to correct it. Or just double tap it and it should let you
You might be interested in
What is the expected number of jacks-or-better cards in a five-card hand?
UkoKoshka [18]
 A five card hand is drawn from a deck of 52 cards.
One way to do this is to note that the probability  
7 0
4 years ago
Which country does coriander come from
lawyer [7]
Coriander comes from<span> Morocco and Romania</span>
4 0
3 years ago
Read 2 more answers
You are the systems administrator for a scientific research company that employs over 100 scientists who write and run Linux pro
Ber [7]

Answer:

ls, cd, cat, nano, gedit

Explanation:

There are several commands that will help the sys admin navigate through files but the most common ones are ls and cd. The cd command is quite helpful especially if the sys admin wants to change the current working directory. The ls, however, is the go-to command when we want to navigate and list computer files and folders. Typing ls without invoking any arguments will list all the files in the current working directory. He can invoke extra arguments if he wants to like adding an -a and will list entries starting with . To open text files, the sys admin can use cat, nano, or gedit followed by the text file name to view contents in that file.

8 0
3 years ago
Let T be the statement: The sum of any two rational numbers is rational. Then T is true, but the following "proof is incorrect.
ikadub [295]

Answer:

the mistake is in the first statement.

Explanation:

Now lets us put the statement into consideration:

"The sum of any two rational numbers is irrational"

The negation is: " there exists a pair of rational numbers whose sum is irrational". (Existence of at least one of such a pair).

The negation is not "the sum of any two rational numbers is irrational"

Therefore the mistake is in the first statement and it is due to incorrect negation of the proof.

4 0
3 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Other questions:
  • What key combination in excel takes you back to the first cell
    7·1 answer
  • Write a function (named n_pointed_star) to make the turtle draw an n-pointed star. The function should return nothing, and accep
    10·1 answer
  • Re-write the following arithmetic expressions as Scheme expressions and show the result of the Scheme interpreter when invoked o
    13·1 answer
  • A computer that no longer works after having minor repair work done to it may have been damaged by ____
    13·2 answers
  • Describe three types of physical storage currently used. what usage scenarios would be ideal for each?
    7·1 answer
  • Larry finds it easy to run legacy programs and applications in a virtualized environment. how does the virtualization provider m
    7·2 answers
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Many inventions have enabled us to use digital cameras. The biggest difference between traditional and digital cameras is that d
    10·1 answer
  • About twice a day my Chromebook blacks out. why does it do that?
    8·2 answers
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!