1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
7

A list of the slides in a presentation is found here.

Computers and Technology
2 answers:
Hoochie [10]3 years ago
8 0
 Formatting toolbar because if you look to the right there is the slides and at the top it says: Formatting toolbar
denis23 [38]3 years ago
7 0

Answer: I say formatting because that is what mainly give the presentation the look and graphics and stuff.     PLZ MARK AS BRANLIEST

Explanation:

You might be interested in
Please help
koban [17]
1 . NT file system
Method of storing files used by Microsoft

2 . Installation
The process of putting software on the computer for use

3 . Boot partition
Section of the hard drive where the boot loader program is stored

4 . Upgrade
The process of installing a new version of software to improve performance

5 . File allocation system
Method of storing files used by many different types of computers

6 . Transmission Control Protocol/Internet Protocol
Two separate standards used together that define how data is sent and received across a network

7 . Device driver
Program that controls a piece of hardware

8. Partition
Section of a hard drive used for file storage

9. System partition
Section of the hard drive where the operating system program is stored
3 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
siniylev [52]

The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is said to be a kind of an act that connote the way of invalidating a TLS/SSL before it is said to have a scheduled expiration date.

Note that A certificate can be revoked fast when its private key depiects signs of being compromised.

Therefore, The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about host's certificate from

brainly.com/question/14282680

#SPJ1

5 0
2 years ago
Write 3 functions in the starter code below such that: add_to_dict(): takes a dictionary, a key, a value and adds the key,value
shepuryov [24]

Answer:

Required code is given below:

Explanation:

def add_to_dict(dictt, key,value):

if key in dictt.keys():

print("Error. Key already exists.")

else:

dictt[key]=value

return dictt

def remove_from_dict(dictt,key):

try:

dictt[key]

dictt.pop(key, None)

return dictt

except KeyError:

print("No such key exists in the dictionary.")

def find_key(dictt,key):

try:

value=dictt[key]

print("Value: ", value)

except KeyError:

print("Key not found.")

4 0
2 years ago
Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
abruzzese [7]

In order to complete the series of substitution values from $35 to $45 in increments of $2.50, follow these steps:

  • Input $35 in B21.
  • Highlight B21 to B26.
  • Go to the Home tab.
  • Go to the Editing ribbon.
  • Click on Fill.
  • Click on Series.
  • Step Value = 2.50
  • Stop Value = 45.
  • Click Okay.

<h3>How can you complete a series of Substitution values?</h3>

First input the value you are to start with in the cell you are to start with. In this case that means putting $35 in Cell B21.

Highlight B21 to B26 and then go to the Home tab. Go to the Editing ribbon at the bottom right and click on Fill. Then go to Series and input the step value as 2.50 and the stop value as 45. Click okay and the range will appear.

Find out more on spreadsheet functions at brainly.com/question/1395170.

4 0
2 years ago
Explain the components of Information System?​
slavikrds [6]

Answer:

An information system is essentially made up of five components hardware, software, database, network and people. These five components integrate to perform input, process, output, feedback and control. Hardware consists of input/output device, processor, operating system and media devices.

Explanation:

7 0
3 years ago
Other questions:
  • PLEASE HELP ASAP!!!
    15·2 answers
  • Which is a function of network media?
    11·2 answers
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs
    7·1 answer
  • Which of the following is NOT a web browser?<br> Safari<br> Chrome<br> Bing<br> Firefox
    8·2 answers
  • \Read the sentence.
    12·1 answer
  • An advertiser who sells coffee beans adds the keyword "Java'" to an ad group. After two weeks, she runs a placement performance
    11·1 answer
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • Mariah was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
    13·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • What output is generated by this for loop?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!