1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
4 years ago
5

Deanna wants to have an exciting presentation and adds animations. She wants her bullet points to be animated through motion. Wh

ich represents three different option for motion paths in her presentation? Bounce, Turns, Split Shapes, Fade in, Darken Arcs, Lines, Loops Pulse, Spin, Wave
Computers and Technology
2 answers:
aivan3 [116]4 years ago
3 0
Fade in is the correct answer
Lina20 [59]4 years ago
3 0

<em>Motion paths</em>, differ from the other custom animations in Microsoft PowerPoint – entrance, exit, emphasis – because the animations in this group are best used when you want to move the slide objects from one point to another in order to illustrate the point you are telling with your presentation.

From the options given in the question, the three animations that are part of the motion path group are represented in (C) Arcs, Lines, and Loops.  

You might be interested in
A specific type of computer program that manages the other programs on a computer
yarga [219]
Operating system
Reason: operates systems like desktop CPU’s, laptop computers, smartphones, tablet cpus, and gaming consoles
6 0
3 years ago
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
KatRina [158]

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

3 0
3 years ago
Which of these is NOT an example of a GUI?
aksik [14]

Answer:

The answer to this question is given below in the explanation section.  

Explanation:

First, we need to know what is the graphic user interface (GUI)?

A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.

so, in the context of the question, the following are examples of GUI.

Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.

Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.

The followings are not the example of GUI:

Microphone and USB cord because these are the electronic parts and they don't possess the GUI.

5 0
3 years ago
Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
Shtirlitz [24]

Answer:

I am writing a JAVA program:

import java.io.FileReader;  // class used for reading data from a file

import java.io.IOException;  //class used for handling exceptions

import java.io.PrintWriter;  // class used to printing or writing formatted data. It is used when the data to be written contains text and numbers

import java.util.Scanner;   // class used to take input from the user

public class Main  {  //start of the class

public static void main(String[] args)  {//start of main() function body

Scanner input = new Scanner(System.in);  //creates Scanner class object

System.out.print("Enter the input file name: ");  // prompts user to enter the input file name

String input_file = input.next();  //to  read and return the token i.e. input file name and store this into input_file String type variable

System.out.print("Enter the output file name: "); // prompts user to enter the output file name

String output_file = input.next();   /to  read and return the token i.e. output file name and store this into output_file String type variable

try   {/* try  defines a chunk of code to be tested for errors during the execute of this chunk. its a code block for reading from input file and writing to output file. This handles the exception if program cannot create or write to the file indicated. */

   FileReader inFile = new FileReader(input_file);  //creates object inFile of FileReader class to read the input_file contents

   Scanner scan = new Scanner(inFile);  //read and scans the input file

   PrintWriter outFile = new PrintWriter(output_file);  //creates object outFile of PrintWriter class to write to the output file. It is used to write output data in a readable text form.

   int count = 1;    //counts the line number      

   while (scan.hasNextLine())  {  //loop keeps checking for the next line in input file

    String lines = scan.nextLine();  // reads the entire line of the input file and stores that line contents in String lines

    outFile.println("/* " + count + " */ " + lines);  //each line represented with line number enclosed in /* */

    count++;  }   //increments the line number at each iteration    

    outFile.close();        }  //closes the output file after writing the contents from input file with each line of the input file enclosed in  /* */

catch (IOException e)  {  // catching the IOException and prints the following message if program cannot create input_file or write to the output_file

   System.out.println("Error processing file: " + e);    }     }   }

Explanation:

The program is well explained in the comments mentioned with each statement of the above program. The user is prompted to enter input and output file names. Then the program uses a while loop that scans through lines of the input file and count variable counts each line of input file. Then at each iteration the count variable counts a line of input file and line number of each line of the input file is enclosed in /* */ delimiters. The contents of input file, in which the line numbers of text lines of the input file are enclosed in /* */ delimiters, is written to the output file.

The screenshot of the program is attached along with the output file produces as a result of this program execution.

7 0
3 years ago
What are the 2 levels of formatting in a word document
goldfiish [28.3K]

Answer:

Paragraph Styles and character formatting (font, color, etc.)

7 0
3 years ago
Other questions:
  • What setting must be enabled to view data in Demographics and Interests Reports? Content Grouping Advertising features User perm
    13·1 answer
  • When creating a query using the query design command, first you must ____?
    13·1 answer
  • How do you make Thumbnails and outros on Youtube for free?
    8·1 answer
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • We need ____ pointers to build a linked list.
    6·1 answer
  • After reviewing device security you learn that a malicious user in an airport
    14·1 answer
  • Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
    12·1 answer
  • Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1.
    5·1 answer
  • Why does brainly say im in highschool when im in middle school?
    15·2 answers
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!