1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
9

As a general rule, the number of bullet points on a slide should not exceed _____. a.2 b.4 c.8 d.10

Computers and Technology
1 answer:
Paraphin [41]3 years ago
6 0
Letter B is correct!! My teacher told me!!
You might be interested in
How do you find the exterior angle measure of any regular polygon? (The degree in which to turn the turtle to draw a shape)
Diano4ka-milaya [45]

Answer:

360/number of sides

Explanation:

all the exterior angles add up to 360°

so to find each angle mesure, divide the 360 by the number of sides the figure has.

7 0
3 years ago
With _____, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data
Ket [755]

Answer:

D) Unsupervised Data mining

Explanation:

Unsupervised data mining also refered to as undirected data mining reveals hidden patterns in unlabeled data. In this method, there are no output variables to predict. The aim of an unsupervised data mining technique is to uncover patterns in data based on the relationship between the data points and each other

5 0
3 years ago
Explain why the fundamental software engineering principles of process, dependability, requirements management, and reuse are re
Georgia [21]

These principles are not explicit to one kind of program and are increasingly broad "best practice" rules that assist designers with composing code that is easier to maintain.

<u>Explanation:</u>

A set of programming guidelines that are executed to play out a particular undertaking according to the prerequisites of the client is known as programming. Every product has some essential standards to follow. In light of all product frameworks have basic quality traits, including accessibility, modifiability, execution, security and wellbeing, testability and ease of use, the key programming thoughts give basic arrangements or strategies to help those characteristics.

It is generally less expensive, over the long haul, to utilize programming designing strategies and methods for programming frameworks instead of simply compose the projects as though it was an individual programming venture.

8 0
3 years ago
This information is stored in every IP packet to make sure that the packet is eventually discarded if it cannot find the address
Andreas93 [3]

Answer:

TTL

Explanation:

TTL means time -to- live field is a counter that is designed to keep packets from circulating indefinitely in the network case forwarding tables accidentally create cycles. An IP datagram is typically initialized with a TTL of 60 or 64 and the TTL is decremented by one each time it enters a router. If the TTL reaches zero, the router will discard the packet. It is one of the components of the IP datagram

6 0
3 years ago
What does clicking and dragging the fill handle in excel
Olegator [25]

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

5 0
2 years ago
Other questions:
  • Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
    6·1 answer
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • Who conceptualizes the design and the working of a website
    15·1 answer
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • Which type of graph or chart measures
    15·2 answers
  • For questions 3-6, consider the following two-dimensional array:
    11·2 answers
  • Which computer peripheral is used when you would like to use a DVD or CD?
    12·2 answers
  • A network of computers that provides access to information on the web.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!