1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
14

The _______ allow(s) you to scroll through slides.

Computers and Technology
2 answers:
Whitepunk [10]3 years ago
5 0
The awnser would be B. Arrow Kyes


Ber [7]3 years ago
4 0
B. Arrow keys
Good luck! :)
You might be interested in
In 1948, a Bell Labs researcher named Claude Shannon wrote a technical report in which he proposed that all information media co
antiseptic1488 [7]

Answer: true

Explanation:

Claude Shannon’s law says that the highest obtainable error-free data speed, expressed in bits per second (bps), is a function of the bandwidth and the signal-to-noise ratio.

Claude Shannon is regarded as the father of Information technology and he was a researcher of Bell Labs. The report he presented is known as the Information report.

8 0
4 years ago
The numbering system we commonly use is called the decimal numbering system because it uses ________ symbols to represent all po
mojhsa [17]

Answer:

10.

Explanation:

Decimal numbering system is a number system which has ten digits. These ten digits are 0,1,2,3,4,5,6,7,8 and 9. It has signed and unsigned digits. The signed digits represents negative values of digit with the minus "-" sign written before the digit. The unsigned digits have no sign before them.

Binary numbering system has only 1 and 0 digits, while the hexadecimal number system has 16 digits.

6 0
3 years ago
Rock, Paper, Scissors is a two-player game in which each player chooses one of three items. If both players choose the same item
mezya [45]

Answer:

The answer is c

Explanation:

7 0
4 years ago
Because we live in a digital age and our presentations may be available for viewing for years to come, we have to be careful of
Rus_ich [418]

Answer:

presentation

Explanation:

Based on the scenario being described within the question it can be said that we have to be careful of our presentation so we do not date ourselves too badly. Presentation refers to the way we look, dress, and act. Such as the clothes and accessories we wear, the way we style our hair, etc. All done in order to look our best to others.

3 0
4 years ago
Read 2 more answers
QUESTION 2
n200080 [17]

Group of answer choices.

A. Apply numbering to the list.

B. Apply bullets to the list.

C. Apply multilevel numbering to the list.

D. Manually enter a ">" character at the beginning of each item in the list.

Answer:

B. Apply bullets to the list.

Explanation:

Formatting is a feature found in a lot of word processing software applications such as Microsoft Word, Notepad, etc., which is designed to avail end users the ability to apply specific formatting options such as cut, bold, italics, underline, list, etc., to texts based on certain criteria defined by an end user.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word, a list can be formatted using a numbered or bulleted arrangement style. A numbered style (1, 2, 3, 4, etc) is typically used for an ordered list while a bullet is designed to be used for an unordered list.

Hence, the best way to format a document containing a list of items that appear in no particular order is to apply bullets to the list.

For example, a bulleted list of my favorite subjects arranged in no particular order would appear as this;

  • English language
  • Mathematics
  • Geography
  • Biology
  • Chemistry
  • Physics
  • Computer technology
7 0
4 years ago
Other questions:
  • When sending a packet of data from source host to a destination host over a fixed route. Which of the delay components are varia
    8·1 answer
  • One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
    13·2 answers
  • python An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase an
    14·2 answers
  • Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
    6·1 answer
  • Which of the following representations in two's complement notation represents the largest value?
    12·2 answers
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • I'll give brainlyist
    9·2 answers
  • ________ include programs such as word processing, spreadsheet, database,presentation graphics. Personal information,
    6·1 answer
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • Select the best answer from the drop-down menu. Sometimes people feel threatened by new ideas and different ways of doing things
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!