1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
7

Describe the steps to play a presentation the way your audience will see it. A)Go to the View tab and select Editing View. B)Go

to the View tab and select Reading View. C)Go to the View tab and select Slide Show. D)Go to the View tab and select Watch.
Computers and Technology
1 answer:
Sonbull [250]3 years ago
5 0

C) Go to the View tab and select Slide Show.

Explanation:

Steps for Slide Show View to Deliver a Presentation:

  • Go to the Slide Show view from the Task bar at the bottom of the slide window.
  • Use the Slide Show view to deliver your presentation to your audience.
  • Slide Show view occupies the full computer screen.

You might be interested in
When is cookies Useful or Inappropriate
Kisachek [45]

PUT THAT COOKIE DOWN!!!!!

5 0
3 years ago
Read 2 more answers
Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, acc
Mashutka [201]

Answer:

New Technology LAN Manager (NTLM)

Explanation:

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash’s password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM’s cryptography also predates newer <em>algorithms</em> such as <em>AES or SHA-256</em> and is susceptible to brute force attacks by today’s hardware.

5 0
4 years ago
Read 2 more answers
There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
ludmilkaskok [199]

Answer:

first statement makes most sense.

Explanation:

When checking numeric values in computer memory, decimal makes sense because you use decimal numbering every day. --> sounds OK.

When checking words in computer memory, decimal makes sense because you use decimal numbering every day.  --> doesn't make sense

When comparing values in a computer program, decimal numbering makes sense because it is always shorter than hexadecimal. --> Not true

When checking words in computer memory, decimal numbering makes sense because it is easier than hexadecimal. --> Hexadecimal would be easier when inspecting computer words, because you can easily see the byte alignment of the values.

4 0
3 years ago
Read 2 more answers
In the article "Prioritizing IT Spending Through Cyber Risk Assessments"--when making prioritization decision organizations shou
borishaifa [10]

Answer:

Build budget base on risk assessment, develop the incident response plan is the correct answer.

Explanation:

Prioritizing IT Spending By cyber risk analysis while trying to make strategic decision-making companies must include cyber risk assessment, creating a risk assessment framework on the budget, improving staff training and establishing an incident response plan.

So, the following answer is correct about the given statement.

7 0
3 years ago
Using the Sakila database, create a query that displays the film title, description, as well the actor first and last name for a
Alex787 [66]

Answer:

Select title, description , first_name, last_name from film inner join film_actor on film.film_id = film_actor.film_id inner join actor on film_actor.actor_id = actor.actor_id where title LIKE 'zo%';

Explanation:

  • The INNER JOIN keyword selects records that have matching values in both tables.
  • The WHERE clause is used to filter records.
  • The WHERE clause is used to extract only those records that fulfill a specified condition.
7 0
3 years ago
Other questions:
  • Create a class called Animal that accepts two numbers as inputs and assigns them respectively to two instance variables: arms an
    11·1 answer
  • How many frequencies does a full-duplex qam-64 modem use?
    8·2 answers
  • On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
    12·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • Use fuel with the _____________ rating recommended by your vehicle manufacturer. A ) Converter B) Emission C) Exhaust D) Octane
    9·2 answers
  • The best way to insert an existing Excel chart into a document is to
    8·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • For a loop counter, the appropriate data type would be:
    9·1 answer
  • ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE
    14·2 answers
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!