1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?

Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
7 0
This is the task mangier panel or i guess as they are calling it the task panel.
you can access this with control, alt, delete.
You might be interested in
Which type of movement lets the player control an object's movement?
Levart [38]
X and y imposed axis
7 0
3 years ago
Write a program to do the following: Load $t0 with 12 and call it x. Load 21 in $t1 and denote it as y. Finally, load 32 in $t2
ELEN [110]

Answer:

addi $t0, $zero, 12

addi $t1, $zero, 21    

addi $t2, $zero, 32    

addi $t3, $zero, 3

mul $t3, $t3, $t0

mul $t3, $t3, $t0  

addi $v, $zero, 10

mul $v, $v, $t1  

addi $w, $zero, 5

mul $w, $w, $t2  

add $a0, $t3, $v

add $a0, $a0, $w

addi $v0, $zero, 1

syscall

Explanation:

  • Use the addi statement to initialize the t0, t1 and t2 variables with a 0 value.
  • Use the mul statement to multiply the t0 with t3 and then multiply variable v with t1.
  • Use the add statement to add the variable v with t3 and assign the result to a0 variable.
  • Use the add statement to add the variable w with a0 and assign the result to a0 variable.

3 0
3 years ago
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes us
Lynna [10]

Answer:

cs

Explanation:

5 0
3 years ago
A chief technology officer has seen the company grow significantly in the last three months. historically, the application was h
GaryK [48]

Infrastructure as a service (IaaS) is a cloud computing offering in which a vendor provides users access to computing resources such as servers, storage and networking. Organizations use their own platforms and applications within a service provider's infrastructure.

4 0
2 years ago
Other questions:
  • The Internet began when a large company wanted to sell products online. True False
    15·2 answers
  • You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
    10·1 answer
  • In computer Drag and Drop“ means to select the items, hold down the mouse and
    15·1 answer
  • Corinne is on a project team and they are in the project execution phase. She gets a call from a stakeholder to make a change to
    6·1 answer
  • Seeing her Daughter graduate from college is most likely a short term goal for a person of which of these ages ? A) 24 years old
    10·1 answer
  • Primary purpose of ms Excel​
    10·1 answer
  • What are the different methods of enhancing/decorating<br> bamboo product​
    15·1 answer
  • Help asap please!
    15·1 answer
  • Why might you use the More button in the Find and Replace dialog box?
    10·1 answer
  • Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!