1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?

Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
7 0
This is the task mangier panel or i guess as they are calling it the task panel.
you can access this with control, alt, delete.
You might be interested in
Order the steps for accessing the junk email options in outlook 2016
Zinaida [17]

Answer:

What is the question here? lol

Explanation:

8 0
4 years ago
Favorite friends character and why GO!
Masteriza [31]
Rachel Def i really don’t know just cause
7 0
3 years ago
Read 2 more answers
Suppose I have two DFAs D1, D2 and I perform the product construction on them to get a DFA for the union of their languages. Wha
Musya8 [376]

Answer:

Explanation:

If L(D1) = L(D2), the D has every state being final

If L(D1) = L¯(D2), the D has every state being final

If L(D1) = ∅, then L(D) = L(D2).

If L(D1)=Σ, L(D) = L(D2)

8 0
3 years ago
Which type of data storage allows computers to read and write to the memory while the computer is powered on?
klasskru [66]

Answer:

RAM

Explanation:

RAM is Random Access Memory, which means you can access whenever as long as it is powered on.

8 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Other questions:
  • List two ways that guest could be defined
    12·2 answers
  • Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
    10·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • Write an SQL statement that uses all of the SQL built-in functions on the Quantity-OnHand column. Include meaningful column name
    14·1 answer
  • In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw
    10·1 answer
  • What is the output of the following code:
    12·1 answer
  • It is a set of computer instructions​
    10·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • Question 2 of 10
    15·1 answer
  • Select the functions in the Insert tab in PowerPoint.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!