1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
4 years ago
13

What is the most useful advantage of using the Slide Sorter view to rearrange slides instead of using the slide thumbnails in No

rmal view? In Slide Sorter view, the user can type on and drag objects onto slides while also seeing the order of the slides. In Slide Sorter view, the user can zoom in to read text on slides more easily or zoom out to see more of the presentation’s slides at once. In Slide Sorter view, the user can click on slides and simply drag them to new locations, but with slide thumbnails the user must manually enter slide numbers. In Slide Sorter view, the user can see the slides as full-screen images, exactly like how they appear to Slide Show viewers, but in Normal view the user will only see small thumbnails.
Computers and Technology
1 answer:
Zarrin [17]4 years ago
4 0
In Slide Sorter view, the user can click on slides and simply drag them to new locations, but with slide thumbnails the user must manually enter slide numbers.
You might be interested in
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
GREYUIT [131]

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

4 0
3 years ago
What does it mean to calculate frequencies within a dataset
Vadim26 [7]
To count the number of times a dataset is used by a student 
<span>to calculate the product of two variables to make a third variable </span>
<span>to count the number of cases that fall into different subgroups within a dataset </span>
<span>to calculate the sum of a column of variables in a dataset </span>
7 0
3 years ago
Read 2 more answers
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
I recently fixed my computer's hard drive, and when I rebooted my comp., the mouse and keyboard won't work. The keys work when i
dezoksy [38]
Just simply do a hard reset, all your data will be lost but i think it will work, with my computes passed the same.
5 0
4 years ago
Other questions:
  • Match each of the following terms to its function:_________
    13·1 answer
  • A GPO component that’s an Active Directory object stored in the System\Policies folder. The GPC stores GPO properties and status
    14·1 answer
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • How do i recover a google account that was deleted?
    7·1 answer
  • Master pages are used to create
    7·1 answer
  • He flow of electric charges through a material describes an electric _______.
    10·1 answer
  • Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transact
    6·1 answer
  • 2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    10·1 answer
  • A capacitor of capacitance 102/π µF is connected across a 220 V, 50 Hz A.C. mains. Calculate the capacitive reactance, RMS value
    8·1 answer
  • Which protocol is responsible for transporting files between a client and a server?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!