1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
11

You can add a new slide to a presentation by

Computers and Technology
1 answer:
jeka943 years ago
6 0
Clicking add slide to make more slides for your project
You might be interested in
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
4 years ago
What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?
myrzilka [38]
Operating System  (OS) is the answer.

An application runs in/on an OS.  It is not the OS itself. Like Word or Chrome are applications. 

Systems is too generic and not specific enough to mean anything in this context.  Throw away answer.

Network Operating System does not 'usually' run on a hard drive but on memory chips in things like routers, wireless access points and switches that move network traffic.


3 0
3 years ago
What does gps stand for ?
frutty [35]
GPS stands for Global Positioning System
3 0
4 years ago
Read 2 more answers
Differences between barcode reader and character recognition devices​
spin [16.1K]

<u><em>Differences between barcode reader and character recognition devices​:</em></u>

Barcode Reader or Barcode Scanner:  

  • Barcode Scanner scans the data by brightening the barcodes usingSensor
  • The analog signal is then converted into digital signal by Converter.
  • The Decoder calculates the converted data and sends valid data to the computer.  

Character Recognition Devices (OCR):

  • OCR scans the physical document and converts them into two-coloured format.
  • The darker and lighter area are identified as characters and blanks respectively.
  • The common methods used are: Pattern Recognition and Feature Detection.

3 0
3 years ago
Read 2 more answers
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
3 years ago
Other questions:
  • What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space?Pace?
    11·1 answer
  • Brittany just pulled up a database table with employee information that contains 50 records of employees at her company. Which o
    12·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific
    15·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • How do you think computers have helped improve documentation, support and services within the healthcare industry
    13·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    6·1 answer
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the g
    12·1 answer
  • Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!