1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
15

Which option will you use to show your presentation to the audience?

Computers and Technology
1 answer:
spin [16.1K]3 years ago
3 0

Answer:

Powerpoint is a good option.

Explanation:

You can also connect the computer that has to powerpoint to a larger monitor.

Hope it helps! :)

You might be interested in
Why were video games invented?
Alenkinab [10]
The answer is in the following website: https://www.reference.com/history/were-video-games-invented-e9413d3dc1378766


4 0
3 years ago
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ____ key.
AVprozaik [17]
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ESC key. ESC stands for <span>Escape.
</span>The escape key is found <span>on most computer keyboards.  When the ESC key is presses t</span>hen the escape command is sent from the keyboard to a computer and this command o is interpreted by software as "stop". So, it is used to stop some actions.
5 0
3 years ago
In Microsoft Word, when you highlight existing text you want to replace, you're in <br>     
IRISSAK [1]
You are in a formatting toolbar.
5 0
3 years ago
Read 2 more answers
Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
Ipatiy [6.2K]

Answer:

prevent set-backs

Explanation:

some others can be project initiation, project planning,  project execution, project monitoring and control, and project closure.  Hope it helps you! If it does it would be appreciated to be marked brainliest

6 0
3 years ago
Which of the following software monitors a user's activities and sends the information back to another source without the user k
sdas [7]

Answer:

Malware

Explanation:

Some of the examples of Malware are Spyware, Viruses, Adware, Fake security software and Browser hijacking software. And these are a piece of codes, and if this is successfully installed on any computer, it spies through the user's activity, and without any consent of the users, sends all those personal and various other very sensitive data like credit card related information to the hacker. and who then take control of all your activities, and can threaten you, and ask for money to let you go free. Hence, always be clear to operate with only trusted parties.

5 0
3 years ago
Other questions:
  • What are some beginning keyboarding questions?
    10·2 answers
  • The overall purpose of a food guide is________.
    11·1 answer
  • Which group on the sparkline tools design tab would you choose if you wanted to change the data source of the sparkline? (1 poin
    10·1 answer
  • What is a major way that a consumer can protect himself/herself when getting a credit card? A) Making sure that they get a very
    8·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • An alarm clock draws 0.5 A of current when connected to a 120 volt circuit. Calculate its resistance.
    10·1 answer
  • Write a class of complex numbers consisting of:
    11·1 answer
  • FREE POINT IF YOU ADD ME AS A FRIEND <br> XOXOANAI04
    13·2 answers
  • python Which data type is the best choice to store the number of wins associated with each basketball team in the NBA
    12·2 answers
  • Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!