1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
13

You are using a PowerPoint template from your school to present your research findings in front of the class. What would you do,

besides changing the content, to make the presentation seem new and fresh?
A)Change the size of the slides.

B)Change the title for the slides.

C)Change the theme for the slides.
Computers and Technology
2 answers:
Doss [256]3 years ago
8 0

Answer:

Imma go with size of slides

astra-53 [7]3 years ago
3 0
The answer is A size of the slides.
You might be interested in
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
What is the best example of an interrogative sentence?
gavmur [86]

Answer:

How many clubs and quilting societies that flourish today have Amish roots?

Explanation:

4 0
3 years ago
Read 2 more answers
what should i do after learning python? how can I make apps or gaming apps? IF YOUR ANSWER WILL BE GOOD I WILL MARK AS BRAINLIES
seraphim [82]

Answer:

Here are some of the things that you can do after learning Python:

Learn a Web Development Framework

Learn Machine Learning

Start Teaching Python to Beginners (and earn some bucks)

These are the top three ways to proceed

Explanation:

8 0
3 years ago
Read 2 more answers
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how
GenaCL600 [577]

Explanation:

Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies.  They uses technology to render services.

Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.

How policies on encryption could be implemented to prevent cyber attacks by:

Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.

1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.

2. Rules on encryption of sensitive messages and back up data.

3. rules on encryption of Log in details and passwords

7 0
3 years ago
Sharon has just invented a new tractor that will plow and plant a new hybrid of corn at the same time. Which type of engineer is
Alex_Xolod [135]

she has to be A......


8 0
3 years ago
Other questions:
  • What are two parts of a cell reference?
    7·1 answer
  • The ___________ command waits for windows 7 to save your work and then turns off the computer fans and hard disk. answer shut do
    11·1 answer
  • This is not based on homework but I have a question. I am currently using a gtx 960 with a 6 core amd processor. Does anyone kno
    6·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • Linda installed a special pool for the hydrotherapeutic treatment of severe arthritis, as prescribed by her doctor. The cost of
    5·1 answer
  • Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
    6·1 answer
  • What must be the same for each variable in an array in compiled languages?
    10·1 answer
  • Evaluate the following expression: <br> 12+(2**4-5)/2Required to answer. Single choice.
    10·1 answer
  • If you were a game programer (NOT using scratch or other basic software making platforms) what kind of code would you use for th
    6·2 answers
  • The formula (Block address) modulo (Number of blocks in the cache) shows the typical method to index a direct-mapped cache. Assu
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!