1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
15

You can copy and paste ________ from excel to powerpoint

Computers and Technology
2 answers:
dybincka [34]3 years ago
5 0
Your answer is:data
Tanya [424]3 years ago
3 0

Answer: data

Explanation:

You might be interested in
What do the following white characters symbol represent?<br> a) ¶<br> b) .
RoseWind [281]
???????????????????
3 0
3 years ago
A major weakness of a lot of file processing systems is that ____.
Gnesinka [82]

They are several weaknesses or disadvantages of file processing systems but the major weakness is data redundancy and inconsistency. By data redundancy, I mean duplication of data. There are no better methods to validate insertion of duplicate data in file systems. Data redundancy can also increase the chance for errors.






7 0
4 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Using the diagram to the right, match each letter
alexira [117]

Answer:

A - slide

B - ribbon

C- command

D - group

E - format painter

F - tab

Explanation:

edge2020

5 0
3 years ago
the graph at left in the tctct, c-plane models the global wind power capacity, ccc, in gigawatts, ttt years since 199619961996.
Elena-2011 [213]

The intercept of a graph is the point where the graph crosses the axes of the graph.

The interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

On the graph (see attachment), we have the following observations

  1. The vertical axis represents the global wind power capacity (i.e. the c-axis)
  2. The horizontal axis represents the years since 1996 (i.e. the t-axis)

So, the c-intercept is the point that crosses the vertical axis.

From the graph, the curve crosses the c-axis at c = 7, and t = 0 (i.e. years = 1996)

Hence, the interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

<em />

<em />

Read more about intercepts at:

brainly.com/question/3334417

4 0
2 years ago
Other questions:
  • A __engineer specializes in computer hardware design and integration.
    15·1 answer
  • Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because o
    8·1 answer
  • How do you delete a slide from your presentation after selecting it
    8·1 answer
  • What is not a common purpose for a research report?
    5·2 answers
  • The process of converting information from a form/questionnaire is referred to as data preparation. This process follows a four-
    10·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
    11·1 answer
  • This sensor is used for burglar alarms<br>A. temperature<br>b. humidity<br>c. movement<br>d. PH​
    15·1 answer
  • What is the<br> binary code<br> for<br> "DMS"?
    8·1 answer
  • Explain the consequences of using bits to represent data.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!