1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
14

Definition of powerpoint animation

Computers and Technology
1 answer:
saul85 [17]3 years ago
3 0

Answer:

An powerpoint animation is an animation that uses powerpoint or another similar app like google slides to create a video, game, or movie.

but...

If you mean just in Microsoft Office it's a visual or sound effect that you can add to slides to make them more interesting.

Explanation:

You might be interested in
Which description of the plain text file format is most accurate?
Sedbober [7]

Answer:

uses binary code to store data!

Explanation:

5 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Next, let's examine what happens when you apply a style to an element that contains other elements. The body element in the HTML
CaHeK987 [17]

Answer:

When the body element CSS color style was changed, The color of all the text in the HTML file changed to the specified color, the same goes for font-size, font-weight, etc.

Explanation:

HTML or hypertext markup language is a markup language used in web development to implement the position and structure of the web page. It has no style, so, CSS or cascading style sheet is used to style the HTML elements in the web page.

4 0
3 years ago
You have an interface on a router with the ip address in the class c network subnet of 192.168.192.10/29. how many total host ad
Gemiola [76]
If 29 bits of the 32 available addressing bits are used for the subnet, then only 3 bits giving 2^3=8 combinations remain for the host addresses. 

In reality, the all zeros and all ones addresses are reserved. So, 8 addresses can exist, but 6 of those are available.

The way the question is formulated it seems the answer 8 is what they're after.
8 0
4 years ago
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organiza
ratelena [41]

Answer:

A bridge could permit access to the secure wired network from the unsecured wireless network

Explanation:

A bridge is connecting device in networking that connects two different network devices. This device is suitable to connect a secure network with an unsecured network.

8 0
3 years ago
Other questions:
  • Is Apple a consumer or luxury brand? Give examples.
    10·1 answer
  • Most keyboards today are in a
    8·1 answer
  • How do you get 99 points on sunny meadows simulation?
    6·2 answers
  • Your company has recently been hired to install a smart security system for a large office building. The system will include sec
    12·1 answer
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g<=64): print("F") if (g>=65 and g<69): pr
    11·1 answer
  • Consider three different processors P1, P2, and P3 executing the same instruction set. P1 has a 3 GHz clock rate and a CPI of 1.
    8·1 answer
  • Web résumés are posted to the Internet in HTML format.<br> true or false
    9·2 answers
  • What is the CSS property used to style text as all lowercase or uppercase?
    14·2 answers
  • The purpose of the 3030 gas dehydration unit
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!