1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
15

Next, Jamal wants to copy text from a Word document to the slide he just added. He outlines the steps to complete his task. Step

1: Select the text. Step 2: Click the Copy button. Step 3: Click the Paste button. Which step is missing? Where should this step be placed in Jamal’s outline?
Computers and Technology
2 answers:
Misha Larkins [42]3 years ago
3 0

Answer:place an insertion point/after step 2

Explanation:I just took the quiz

oksian1 [2.3K]3 years ago
3 0

Answer: which step is missing?

Where should this step be placed in jamals outline?

Explanation:

I just did it

You might be interested in
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
2 years ago
Which programming languages are the best choices for desktop applications? Select 3 options.
slega [8]
The three are Python c and html
5 0
3 years ago
Read 2 more answers
Create a class called Fraction. Provide a constructor that takes 2 integers. Provide methods for:
tekilochka [14]

Answer:

Explanation;

else

System.out.println("f1 and f2 are not equal");

switch (input.charAt(0)

{

case '+':

f3 = f1.add(f2);

System.out.println("f1+f2=" + f3);

break;

case '-':

f3 = f1.subtract(f2);

System.out.println("f1-f2=" + f3);

break;

case '*':

f3 = f1.multiply(f2);

System.out.println("f1*f2="+f3);

break;

case '/':

f3 = f1.divide(f2);

System.out.println("f1/f2="+f3);

break;

default:

System.out.println("Illegal command: " + input );

break;

}

}// end of while loop

} // end of main

}

 

Note ; this is the last part of the programme check the attachment from 1-5  this is the 6th .

8 0
2 years ago
A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com
algol [13]

The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

<h3>What is a hard disc?</h3>

The "DoD Standard" is a term used during the data sanitizing industry and refers to DoD 5220.22-M, and the further discussion can be defined as follows:

The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

The sparging eliminates statistics to entirely delete the gravitational flux from electronic media.

Hard drives as well as other data storage devices, for example, computer tapes, retain magnetic data.

It could no longer be seen as storage after a disk is degaussed.

Therefore, the final answer is "Using the DoD 5220.22-M method and  Degauss media with a magnet".

Learn more about hard disc at:

brainly.com/question/13329582

#SPJ1

3 0
1 year ago
Three types of neurons and their function
kramer

<u>Efferent Neurons:</u> efferent neurons are motor neurons that carry neural impulses away from the central nervous systme and towards muscles to cause movement.

<u>Interneurons: </u> a neuron which transmits impulses between other neurons, especially as part of a reflex arc

<u>Astrocytes:</u> Astrocytes are the most numerous cell type within the central nervous system (CNS) and perform a variety of tasks, from axon guidance and synaptic support, to the control of the blood brain barrier and blood flow. To perform these roles, there is a great variety of astrocytes.

Explanation:

7 0
3 years ago
Other questions:
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • Assume that nextWord is a String variable that has been given a String value consisting entirely of letters. Write some Java cod
    6·1 answer
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    7·1 answer
  • Which of the following can you use to attach external hardware devices to a computer?
    11·2 answers
  • Do you need internet to play xbox one
    14·1 answer
  • Which job role requires you to create user guides for computer products and services?
    13·2 answers
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
    10·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • What does the following process describe?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!