1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
7

Select all that apply. How do you save presentations?

Computers and Technology
1 answer:
Len [333]3 years ago
3 0

Answer:

it's number 3 if I remember for Microsoft Excel

Explanation:

click “File” from the menu in the top left-hand corner of Excel. Then click “Save As

You might be interested in
Everyone should try to be an NFL quarterback because they earn so much money. True or False
In-s [12.5K]
No. It is statistically unlikely to even make it into the NFL. Pursuing this is not the best idea.
6 0
4 years ago
Read 2 more answers
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
If I add a # symbol in front of the cells row/column, it will keep the value true.
jonny [76]
I think trueeeeeeeeeeeeeeeeee
3 0
3 years ago
Read 2 more answers
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
svp [43]

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

brainly.com/question/2780939

5 0
3 years ago
Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
Leviafan [203]
Answer: What’s this??
7 0
3 years ago
Other questions:
  • Inherent flaws in system software code are called:
    7·1 answer
  • What is an abstract class? (Points : 2) A generalized class used only to create related derived classes
    6·1 answer
  • you are researching the Holocaust for a school paper and have located several Web sites for information. In a paragraph of no le
    7·1 answer
  • What type of chart is good for single series of data​
    15·2 answers
  • The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
    12·1 answer
  • If you insert a single row by using the Insert command on the shortcut menu, you can continue inserting rows by repeatedly press
    7·2 answers
  • 9.6 Code Practice<br> Instructions<br> 1<br> Declare a 4x 5 array called N<br><br> Please helppp
    9·1 answer
  • A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos
    14·1 answer
  • Which keyboard shortcut do we use to turn on APC?​
    13·1 answer
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!