1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
11

Is this statement true or false?

Computers and Technology
1 answer:
Lana71 [14]3 years ago
6 0

Answer:

true

Explanation:

a chart generated in Microsoft excel can be plugged into a presentation authored used PowerPoint. you can only it from excel (by right-clicking on the chart and select copy)and the paste it is PowerPoint. or you can save it and import it as an image(2)

You might be interested in
Which of the following best describes the protocols used on the Internet?
max2010maxim [7]

Answer:

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

5 0
3 years ago
If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
uysha [10]

into a port on the outside of the computer


6 0
3 years ago
Read 2 more answers
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
What is one advantage of using object-oriented programming?
maxonik [38]
That answer would be B hope it helps
6 0
3 years ago
Read 2 more answers
When Kristy recently started a photography business, she downloaded Photoshop to her computer to edit her photos. She notices he
Evgesh-ka [11]

Answer: A. System window and C. System Information window

Explanation:

Hi, RAM stands for Random Access Memory. RAM stores information about running programs in your computer, as long the computer is on.

To know how much RAM is installed on a system you can use the system window tool.

In windows 10 Right click on "Start Menu" and click on "System" in pop-up menu to open "System" window.

System window will show basic information of the computer, including the amount of RAM installed.

Also you can Type "System Information" in the search box, and select "System Information" from search results.

"System Information" window shows a more detailed system summary, of hardware resources and devices. Incluiding RAM.

Feel free to ask for more if needed or if you did not understand something.

7 0
3 years ago
Other questions:
  • Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration
    6·1 answer
  • Does clearing your hard drive make your computer faster reddit
    13·1 answer
  • Your friend called and told you that he saw information about the classified XYZ program on the Internet. As a cleared employee
    14·1 answer
  • How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
    8·1 answer
  • Technician a says that the above illustration shows one method used to keep the chain tension tight in an indirect drive camshaf
    8·2 answers
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • Question # 2
    7·1 answer
  • Tinh T = a1*a2*a3*...an<br><br> Giúp em với
    13·1 answer
  • Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!