1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
3 years ago
12

To add slides to a presentation, _____.

Computers and Technology
1 answer:
Effectus [21]3 years ago
7 0
<span>select the New Slide option from the Insert menu</span>
You might be interested in
Arctic Gear LLC. recently adopted a new ERP​ system, but quickly found that it​ wasn't a perfect fit with their existing procedu
inysia [295]

Answer:

The answer is "Option c".

Explanation:

GAP analyses are worked to specify the business operations and function. It  helps developed the ERP framework across the analysis process, and the variance in business, which uses the existing resource, that should be defined, reported and allowed, and wrong choices can be described as follows:

  • In option a, It described its action or a failure to alter, that's why it is wrong.
  • In option b, This technique fails the system, that's why it is wrong.
  • In option d, It combines the potential for social application, that's why it is wrong.
4 0
4 years ago
When it comes to safety, the choice to be safe is often up to __________?
DENIUS [597]
>>>>>>>>>>>> "You" <<<<<<<<<<<<<                                         

4 0
3 years ago
A network ____ usually contains a computer, networked peripheral, or network device.
Archy [21]
Card
......... ......... ........
8 0
4 years ago
What is the formula for determining the number of possible hosts on a network?
fredd [130]
2**(32 - netmask) - 2 = number of nodes available

The netmask is in CIDR (Common Internet Domain Routing) notation, without the slash.

One of the nodes would be needed for a router or else you can't communicate with other networks.
3 0
3 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Other questions:
  • About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
    12·1 answer
  • Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to
    5·1 answer
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    10·1 answer
  • Wich is the last step in conducting a URL search
    14·2 answers
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Even though a high-level programming language
    11·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • Write a python program that should determine from the range you choose to enter :
    9·1 answer
  • Select the correct answer.
    13·2 answers
  • What does input allow a computer to do
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!