1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
13

Kim is creating a PowerPoint

Computers and Technology
1 answer:
postnew [5]3 years ago
5 0

Answer:

ok???

Explanation:

You might be interested in
The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
mote1985 [20]

The program is correct: at the beginning, product = 0. Then, we start summing Y to that variable, and we sum Y exactly X times, because with each iteration we increase Count by 1, and check if Count=X so that we can exit the loop.

5 0
4 years ago
Suppose you have two RAID arrays, one implementing RAID 3, the other RAID 5. Each has 9 disk drives in its array. If the RAID 5
Snezhnost [94]

Answer:

48 is the answer

Explanation:

16×3 is the explanation for your question

8 0
3 years ago
In MLA formatting, which of the<br> following is correct?
sveticcg [70]

Answer:

what?

Explanation:

8 0
3 years ago
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
jok3333 [9.3K]
It all depends on the brand of phone to do it yourself but, you can call your cell company and they can do it for you through your account.
3 0
3 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
3 years ago
Other questions:
  • Software that interprets commands from the keyboard and mouse is also known as the A.hard drive.B.operating system.C.desktop or
    7·2 answers
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • _______ tags are tiny chips that can be embedded into almost anything and contain information used to track and locate lost pets
    14·1 answer
  • What is the purpose for adding images and graphics to a web page?
    5·1 answer
  • What is the target audience for this poster?
    5·2 answers
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·1 answer
  • The function of an audio mixer is to _____. layer audio tracks at their ideal volume combine, control, and route audio signals f
    6·1 answer
  • Name the type of software which provides the user interface. [1 mark
    5·1 answer
  • Can anyone please help?
    13·1 answer
  • What are some potential challenges that society will face given the digital revolution? You may want to think particularly of th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!