1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
9

Which guideline should you follow when selecting the font for a presentation

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
3 0
My school requires us to use Arial and double space it but we have to use font size 30 for title and 24 for the paragraphs.
You might be interested in
A simple way to think of the Excel application is as a giant ______.
Naddik [55]
Spreadsheet ......zzzzzz
8 0
3 years ago
Read 2 more answers
What is the name of the option in most presentation applications with which you can modify slide elements?
Alexeev081 [22]
Hello  <span>Meadowmilliganp1t1nj 
</span>
Question: <span>What is the name of the option in most presentation applications with which you can modify slide elements?

Answer: View Master

I hope I helped :-)
-Chris</span>
6 0
3 years ago
Read 2 more answers
Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
brilliants [131]

Answer: (B) An individual who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

 Hacktivist is the defined as an individual that basically hacks the various types of web sites and computer system for promoting the various political ideologies. The hacktivists is the method which include the DDOS attacks (Distributed denial of services).

It basically causes various website and the email with the congestion of traffic with the computer virus and by the data stealing. The denial of services attacks typically considered federal crime and illegal in united state.  

4 0
4 years ago
Choose the correct answer base on the Components of Computer System
kondor19780726 [428]
1 - b - Excel is a computer program, so it'd be Software
2 - a - Process of elimination, haven't heard of the term 'peopleware' before.
3 - d - A joystick accepts input from a user to interact with a computer. ex. Flight Simulators
4 - c - A monitor will display (or output) an image based on what is received from the computer.
4 0
3 years ago
A group of interrelated resources acting together according to a plan to accomplish the goals of the records and information man
Verizon [17]

Answer: Record system

Explanation:

 The record system is one of the type of information storage system that stored all the records or data in the form of management system.

  • We can also retrieve the our data or information by saving it in the system so that we can use that specific data for future use.
  • It also helps in ensuring the data integrity and providing an efficient security to our data or information in the system.

 According to the given question, record system is one of the information management system that helps in accomplished the goals in the form of record.

 Therefore, Record system is the correct answer.

8 0
4 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Buying what you want rather than what you need is an example of:
    12·1 answer
  • Define computer ?what is water pollution?<br><br><br>​
    15·1 answer
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • you are a bank loan officer. carter has to come into your office and applied for a loan for a car.you ran his credit report, and
    7·1 answer
  • Which of the following represents a backup system that will aid in recovery for any type of disaster or disruption?
    8·1 answer
  • Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
    9·1 answer
  • 8. Assuming str(rate) is "7.25," what output would be produced by the following snippet:
    15·1 answer
  • Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workst
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!