1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
13

How do you save presentations?

Computers and Technology
2 answers:
DerKrebs [107]3 years ago
6 0

Answer:

select the save option in the file menu

Explanation:I know bc i am great with computers

mixas84 [53]3 years ago
3 0
Save option from file menu
You might be interested in
During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
user100 [1]

The packets would be encapsulated in single frame in scenario A. In scenario B, it should be in multi frames.

In <u>scenario A</u>, given that this network has been said to be prone to error, the packets should be encapsulated in single frames.

The reason for this is because, using a single frame helps to decrease error. We have been told already that it is prone to error. If you use the multi frame, there would be very high likelihood of errors occurring.

In <u>scenario B</u>, given that the network is accurate and very reliable, the best packet is the multi frame.

It would give a quicker transmission and the likelihood of errors occurring is also low.

Read more on brainly.com/question/24373056?referrer=searchResults

8 0
3 years ago
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Is (x.y)' and x'.y' the same? Boolean Algebra
xeze [42]
No its not the same
7 0
4 years ago
Read 2 more answers
A carbon composition resistor having only three color stripes has a tolerance of?
just olya [345]

Answer:

A carbon composition resistor having only three color stripes has a tolerance of 20 percent .

3 0
3 years ago
In what order would you perform the following steps in order to change the color of text in a document?
kupik [55]

1. Select the text that you want to change the color, and copy it.

2. At the toolbar on the top, click the text color, it will have letter "A" with balck line on the bottom.

3. Choose the color, and it will change.

8 0
3 years ago
Read 2 more answers
Other questions:
  • When you enter a two-digit year that is less than 30, Excel changes the year to _____. Question 7 options:
    7·1 answer
  • What is a multipurpose network device?
    12·1 answer
  • What is the main advantage of a bitmap image?
    5·1 answer
  • Shipments of compact digital cameras dropped by 42% due to the industry being unable to adjust to changes in the ________. a. ec
    11·1 answer
  • In cell j6, enter a formula to determine the cost of gas if the customer chose that option as indicated in column i. if the cust
    13·1 answer
  • What do you mean by algorithm​
    9·2 answers
  • HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career o
    6·2 answers
  • Match the following internet related terms to their definition
    13·1 answer
  • Match the roles to the task they perform.
    5·1 answer
  • Which of the following devices is used in the first-generation computer​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!