1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
10

You received a request to create an urgent presentation with predesigned and preinstalled elements. Which option will you use?

Computers and Technology
2 answers:
prohojiy [21]3 years ago
8 0
<span>I will use the pre-designed presentation that way I can use their original design but then I can add the information that I personally want to put on the presentation. Using the pre-designed presentation is the better choice that way I don't have to waste my time making the design, this way I can use my time to make sure the information in my presentation is correct.</span>
Oliga [24]3 years ago
6 0

Answer:

<u><em>power point</em></u>-!

Explanation:

Hello!! Here is the information ---> brainly.com/question/7871373

Hope this helps!!

You might be interested in
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
2 years ago
Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100
Hatshy [7]

Answer:

a) 255

b) 61602

c)

d)

Explanation:

You need to understand the decimal equivalent of hexadecimal numbers, <em>from 0 to 9 numbers are represented the same way, from 10 to 15 we use the alphabet, meaning 10 equals A in hexadecimal base, 11-B, 12-C, 13-D, 14-E, and 15-F.</em>

For your first exercise you'll enumerate the number's positions fromright to lef begining with 0:

a.               F   F

position    1    0

Now you'll multiply your hexadecimal number (using the decimal equivalent for your letters) for the base (16) elevated to the number of the position:

F*16^{0}=15*1=15\\F*16^{1}=15*16=240

Finally, you'll add your results:

240+15=255

FF=255

b.             F  0  A  2

position   3  2  1   0

2*16^{0}=2*1=2\\A*16^{1}=10*16=160\\0*16^{2}=0*256=0\\F*16^{3}=16*4096=61440\\\\2+160+0+61440=61602\\

F0A2=61602

c.             F  1  0  0

position   3  2  1   0

0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\F*16^{3}=16*4096=61440\\0+0+256+61440=61696\\

0F100=61696

d.              1  0  0

position  2  1   0

0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\\\0+0+256=256\\

100=256

I hope you find this information useful! Good luck!

8 0
3 years ago
Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy informat
Vlad1618 [11]

Answer:

C !

Explanation:

7 0
3 years ago
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
Thsi is for gacha girl5467
djyliett [7]

Answer:

lol

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
    7·1 answer
  • What was the technology that defined each of the four generations of computers?
    12·1 answer
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • Working with do-while loop
    9·1 answer
  • A gui allows you to interact with objects on the screen such as icons and buttons true or false
    7·1 answer
  • Using a wireless technology known as ___, many smartphones can now be tapped on special payment devices to complete your purchas
    13·1 answer
  • At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
    5·1 answer
  • Which type of measurement would you use to determine the mass of sugar?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!