1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
13

Describe the procedure for creating a table or spreadsheet in a presentation slide.

Computers and Technology
1 answer:
brilliants [131]3 years ago
5 0
<span>Select the slide that you want to insert a table on.On the Insert tab, in the Tables group, click Table, and then click Excel Spreadsheet.<span>To add text to a table cell, click the cell, and then enter your text</span></span>
You might be interested in
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
____and___ are the two major techniques involved in green computing. //help \\
Rasek [7]
Virtualization and dynamics I think.
7 0
3 years ago
what is the best book or website to learn mechanical machine design? . high detail ,easy to under stand .
Vadim26 [7]
WERE IS A B C D I CANT GIVE YOU ANSWER
7 0
3 years ago
In ipv4 addressing, each ip address is a unique ____ number.
Natali5045456 [20]
32-bit is the correct answer to this question.
4 0
3 years ago
Mohammad plans to visit a cave over the weekend with his friends. He wants to take photos inside of the cave. What piece of equi
Alborosie
A camera strap
Its the only one that makes sense
7 0
2 years ago
Read 2 more answers
Other questions:
  • A built-in tool that enables you to use text to type in commands for the operating system is called the _____ prompt.
    10·2 answers
  • What is an example of a transition effectl
    7·1 answer
  • Which of the following is an example of an application software?
    10·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Computer application just help me with it all ?
    8·1 answer
  • When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
    7·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • What is computer topology​
    5·2 answers
  • Discussion Topic
    11·1 answer
  • What will be the result from running the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!