1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
4 years ago
15

What option do you use to view your presentation?

Computers and Technology
1 answer:
Shkiper50 [21]4 years ago
5 0
I am not sure what do you mean by "option". If you are referring to the menu buttons, then you would click on "View" then select between options ranging from "Start from Beginning" or "Start from Current Slide".

A faster way of doing this would be by simply pressing the F5 button when in PowerPoint to automatically begin the powerpoint from the start.

Hope this helps and good luck! :)
You might be interested in
Difference between volatile and non volatile memory
slega [8]
<span>Volatile memory requires electricity or some kind of current to store information, and nonvolatile memory does not.</span>
6 0
3 years ago
Read 2 more answers
1. Problem solving is
Ne4ueva [31]

Answer:

A

Explanation:

1. Problem solving is

(4 Points)

O A. highly interactive

B. collaborative

C. Both And B

D. Designing an App

4 0
3 years ago
4.which pre-defined feature is known as functions in Excel?<br> a.formula<br> b.property<br> c. data
lesya692 [45]

Answer:

I think formula?

Explanation:

8 0
3 years ago
Which sentance has correct capitalization? A) I can't wait for fall to come because I love Halloween. B) I can't wait for Fall t
nordsb [41]

Answer: should be A i think because the word “fall” does not require capitalization.

Explanation:

3 0
3 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
Other questions:
  • What temporarily holds programs and date while the computer is on and allows the computer to access that information randomly?
    12·1 answer
  • Suppose the work required to stretch a spring from 1.1m beyond its natural length to a meters beyond its natural length is 5 J,
    14·1 answer
  • Which of the following internet connection types is known to have a significantly higher latency than the others
    10·1 answer
  • 8. How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    6·1 answer
  • Write a loop to print 10 to 90 inclusive (this means it should include both the
    10·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Arrays enable the representation of a number of similar items (in terms of their datatypes). They represent these items in an or
    9·1 answer
  • Select all the correct answers.
    7·2 answers
  • Indicate whether the following statements are true or false:
    14·2 answers
  • Write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision Additional No
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!