1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
7

Bullet points on a slide should be limited to _____. A. 2 B. 4 C. 8 D. 10

Computers and Technology
1 answer:
Brums [2.3K]3 years ago
6 0
<span>Bullet points on a slide should be limited to _____.</span>

B. 4 !
You might be interested in
What keyboard functions lets you delete words
lesantik [10]

Answer:

the backspace key is used

5 0
3 years ago
Read 2 more answers
How would you determine if your earned credits would transfer to a regionally accredited school?
rodikova [14]

Answer:

D hope this helped - Willow

8 0
3 years ago
Read 2 more answers
Which of the selections below does not represent a workable ip address?
defon

Answer: C

Explanation:

Because ipv4 ip addresses will be 4 sets of numbers for a maximum of 255 per set ie.  The highest ipv4 number is 255.255.255.255 and the answer C has 293 in it.

6 0
4 years ago
With ____________________, you can insert and remove a device while the computer is running.
padilas [110]
...a hot pluggable interface...
6 0
3 years ago
How can an attacker execute malware through a script?
Anvisha [2.4K]

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

5 0
3 years ago
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • Ok so sometimes when i do something i see a box with a question mark in it, how do i remove it, i am on a macOs High Sierra earl
    11·1 answer
  • Where does communication take place?
    12·1 answer
  • Materials such as copper, silver, and aluminum through which electric energy passes freely are called
    13·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • Do like TikTok??????
    14·2 answers
  • Which of the following players is on offence
    9·1 answer
  • What is lossless compression
    6·2 answers
  • What type of programing code do game developers use.
    13·1 answer
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!