1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
13

How to delete audio from powerpoint​

Computers and Technology
1 answer:
Marta_Voda [28]3 years ago
4 0

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

You might be interested in
My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro
alekssr [168]

Answer and Explanation:

There are three sections to the inquiry.  

1. what occurs inside the PC or host when a bundle is produced by an application.  

2.how it goes from one host that is a source to another host that is a goal with numerous switches sitting in the middle.  

3.what goes inside goal have when it gets a parcel on the system.  

how about we examine individually  

Handling bundle at source machine:  

The application creates a bundle to be sent on the system and sends it to the layer beneath.  

The following layer is known as a vehicle layer which oversees start to finish correspondence between two machines. The convention utilized can be TCP or UDP. What is the contrast between these two conventions is another subject by and large.  

When the parcel is framed at the vehicle layer, it is sent to the system layer which includes source and goal IP in the bundle. A most significant field which is included at IP or system layer is Time To Live (TTL) which is utilized by middle switches/changes to choose if a parcel should be sent or not. (How goal IP is found?)  

After the system layer, the parcel arrives at the information connection or MAC layer, where the source and goal MAC address of machines are included. We will perceive how these fields change between each two neighbors. (How goal MAC is found?)  

The information interface layer pushes this bundle to the physical layer where it is sent as a flood of "0" and "1" on the physical medium accessible.  

Preparing a bundle at switch:  

Steering  

There are three cases which may happen when the switch investigates the directing table for goal IP  

1. On the off chance that there is a section relating to goal IP, we get the interface name the parcel ought to be sent to.  

2. On the off chance that there is no immediate passage, at that point IP is changed over into organize IP utilizing the veil and afterward checked once more. It ought to be noticed that the longest prefix match to locate the best sending interface.  

3. In the case of nothing matches, at that point the switch just advances it to the default goal designed.  

Sending  

Epitome  

Preparing parcel at the goal have  

The parcel is gotten at arrange card, physical layer, which produces a hinder to CPU and CPU peruses bundle in,  

At the information connect layer, goal MAC address is verified whether the parcel is bound to this machine, If indeed, the bundle is sent up to the system layer.  

At the IP layer, parcel approval like checksum confirmation, and so on is done and afterward gave to the applicable vehicle layer.  

Transport later at that point gives it to the fitting port with the goal that it arrives at the right application.

5 0
3 years ago
What is the decimal representation of the following signed binary numbers?
zheka24 [161]

Answer:

(10000000)₂ = -128 in decimal

(11001100)₂ = -52 in decimal

(10110111)₂ = -73 in decimal

Explanation:

<u>NOTE:</u> If Most Significant Bit is 0, it is positive number and if MSB is 1, it is negative number. If number is positive we can simply convert it to decimal. But if number is negative, follow following formula:

  • (complement of the number) +1

<u>EXAMPLE 1</u>

  (10000000)₂

  (01 1 1 1 1 1 1)₂   ↔  complement of the number

<u>+                    1</u>

  (10000000)₂ = 1 ×2^{7}= 128 (magnitude in decimal)

But we remember MSB was 1 so answer is -128.

<u>EXAMPLE 2</u>

  (1 1 0 0 1 1 00)₂

  (0 0 1 1 0 0 1 1)₂

<u>+                       1  </u>

  (0 0 1 1 0 1 0 0)₂ = 52 (magnitude in decimal)

But we remember MSB was 1 so answer is -52.

<u>EXAMPLE 3</u>

  (1 0 1 1 0 1 1 1)₂

  (0 1 00 1 000)₂

<u>+                      1  </u>

  (01 00 1 00 1‬)₂ = 73 (magnitude in decimal)

But we remember MSB was 1 so answer is -73.

5 0
3 years ago
The ________ option contains the formatting and placeholders for all of the items that appear on a side.
densk [106]

Answer:

Slide Layout contains the formatting and placeholders for all items that appear on a slide.

Explanation:

Slide Layout:

Slide layout option in MS PowerPoint contains formatting, placeholders boxes and positioning for all the content that you put on a slide.

Slide layout option allows you to format the contents, insert placeholders boxes for contents such as text or images and do their positioning as you want to appear on a slide. Placeholders are the dotted line containers that hold the content such as title, body text, tables, smart art graphics, charts, pictures, videos, clip art, and sounds.

Slide layout also contains the fonts, effects, colors, and the background (all these collectively known as the theme) of a slide.

However, PowerPoint includes a built-in slide layout, and you can modify these layout on your slide according to your specific needs. Furthermore, you can share your customized slide layout with other people who want to create a PowerPoint presentation.

In addition to, you can built-in standard slide layout in PowerPoint in the Slide-Master View.

If you created the slide, and you want to customize that slide according to specific requirement then you have the option to apply the built-in standard layout on that slide to save the time. Because it is a much easy and time-saving task instead of customizing your own slide from scratch such as making aligning and positioning the contents on the slide

6 0
3 years ago
Which of the following is a group of email names and addresses used for mass distribution of a message?
Jet001 [13]

Answer:

Option D is the correct answer for the above question.

Explanation:

Email list (as the name suggests) is defined as the set of an Email address. It is also the group of address which is needs for message distribution because an Email address is the only necessary part to send the mail which is also called the message. When a user wants to send the mass Email or message then he needs a list of email which can be filled at the "TO" or "CC" or "BCC" part of the compose mail and it can be able to send the mass message.

The above question asked about the list which is useful for the mass message then the answer is an Email list which is stated from the option D. Hence option D is the correct answer while other is not because--

  • Option A states the actor list which is not required to send the mail.
  • Option B states the client list which is not required to send the mail.
  • Option C states the chat list which is not required to send the mail.
3 0
3 years ago
Write a CashRegister class that can be used with the RetailItem class that you wrote in Chapter 6's Programming Challenge 4. The
lys-0071 [83]

Answer:

Following are the code to this question:

import java.util.*; //import package for user input

class RetailItem//defining class RetailItem  

{

private String desc;//defining String variable

private int unit;//defining integer variable

private double prices;//defining double variable

RetailItem()//defining default Constructor

{

   //Constructor body

}

Output:

The Sub Total value: 199.75

The Sales Tax value: 11.985

The Total value: $211.735

Explanation:

In the above code three class "RetailItem, CashRegister, and Main" is defined, in the class "RetailItem", it defines three variable that is "desc, unit, and prices", inside the class "get and set" method and the constructor is defined, that calculates its value.

In the next step,  class "CashRegister" is defined, and inside the class parameterized constructor is defined, which uses the get and set method to return its value.  

In the next step, the main class is declared, in the main method two-class object is created and calls its method that are "getSubtotal, getTax, and getTotal".  

There is some technical error that's why full code can't be added so, please find the attached file of code.  

7 0
3 years ago
Other questions:
  • True are fulse A piece of information that is considered common knowledge does not need a citation
    5·2 answers
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • What can I do if my mouse on my laptop keeps freezing on me for 5 minutes
    11·1 answer
  • HELP ASAP
    10·2 answers
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    9·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • Select the correct answer.
    10·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Help me guys plssssss​
    10·1 answer
  • What problems do you see in the process of transacting business online
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!