1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
3 years ago
9

Working with text in presentation programs is similar to using text in other applications

Computers and Technology
2 answers:
olganol [36]3 years ago
8 0
What are the other applications?
hoa [83]3 years ago
3 0

Answer:

its asking if they similar or different

Explanation:

You might be interested in
Which can be used to enter and manipulate information in a database?<br><br> ANSWER: C) a form
alexgriva [62]

Answer:

a form

Explanation:

it says the answer already in the question

3 0
4 years ago
Farm equipment that travels on public roads
solmaris [256]
I've seen tractors on the roads... if that's what you're looking for.
7 0
4 years ago
Read 2 more answers
While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current dir
dimulka [17.4K]

Answer:

50-64

Explanation:

We know this because I said so

5 0
4 years ago
PLEASE HELP!!!!
hammer [34]
Cooper should have paid more attention on verifying the source of the article before posting it. Without verifying the article, there are chances that your friends within your social media community will criticize you for posting something from a fiction-writing site. Assuming that Cooper's purpose in posting or sharing it online was to be informative, then he'll have to verify the the article if it's true or not.

4 0
3 years ago
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
Leya [2.2K]

Answer:

RADIUS

Explanation:

The administrator needs to set up a RADIUS server for this particular example, RADIUS is a networking protocol, this protocol provides centralized Authentication, Authorization for users who connect and use a network service, this is an authentication remote service, and we can use it with the VPN  (virtual private networks).

7 0
3 years ago
Other questions:
  • You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation
    12·1 answer
  • If you want to insert a column into an existing table what would you do
    11·1 answer
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • In a database, it is possible to make changes such as font, text style, text color, line color, and background color. true false
    13·2 answers
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • I don 't have a question but i want to use video filter but when i click it there was no frames i want to use it .Please
    8·2 answers
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • If the following are using default subnet masks, which one(s) of the following are valid node ip addresses: (select one) a) 220.
    13·1 answer
  • Complete each sentence. To add a graphic to a Word document, start by clicking the tab. Next, click . Then, navigate to the grap
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!