1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
13

You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai

lable from the Choose one answer.
a. Set Up group on the SLIDE SHOW tab.
b. ANIMATIONS tab.
c. Slide Show toolbar.
d. Status bar.
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
7 0
C. slide show toolbar

You might be interested in
What are MIDI signals?
Valentin [98]
Well it could possibly be two things.

Either it's like a standard protocol for communication between electronic musical instruments and computers.

Or


It's a Musical Interface Digital something or other.
4 0
3 years ago
For what kind of shot is a fisheye lens most appropriate?
OlgaM077 [116]

Answer: B

Explanation: a fisheye lense is good for wide shots.

7 0
3 years ago
__________ has become a widely accepted evaluation standard for training and education related to the security of information sy
kirill115 [55]
NSTISSI NO 4011 has become a widely accepted evaluation standard for training and education related to the security of information system. The standard is directed at information security professionals who are experts in identifying system vulnerabilities, investigating system security, documenting, analyzing and evaluating system security technology policies.<span />
4 0
3 years ago
The two principal catalysts for the Information Age have been:________.
jok3333 [9.3K]

Answer:

The two principal catalysts for the Information Age have been computers and communication networks.

Explanation:

Since the invention of computers and internet, people can get the information they need faster than ever before due to the ease of use of both technologies and the relatively cheap price of acquiring the technology.

6 0
3 years ago
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
Other questions:
  • You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
    14·2 answers
  • Which of the following is a category of social media?
    8·2 answers
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Write structured pseudocode to show the following: print “Reorder” when the quantity is less than 20; otherwise print “OK”.
    15·1 answer
  • [This is on Edhesive (coding and programming)]
    8·2 answers
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Why is an increase in tax rate not necessarily increase government revenue​
    10·1 answer
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • I'm bad i'm mrs puff doo doo doo yeah it's a holiday
    6·2 answers
  • What is an automatic update and when should you use it
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!