1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
13

One way to add a table to a presentation is to click on Clip Art under the Insert tab. click on WordArt under the Insert tab. ri

ght-click on an existing page with content and choose Add Table. add a new slide and left-click on the Table symbol in an empty area.
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
7 0
Huh? What is this? …..
You might be interested in
Explain cell reference and its types with examples?​
skad [1K]

Answer:

There are two types of cell references: relative and absolute. Relative and absolute references behave differently when copied and filled to other cells. Relative references change when a formula is copied to another cell. Absolute references, on the other hand, remain constant, no matter where they are copied.

8 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
4 years ago
Describe the benefits of digital technology. Eric reads interesting information about MP3 players and wants to buy one. Which of
Otrada [13]

Answer:

b. Play music

Explanation:

Digital technology helps improve an existing process and makes things better. In this scenario of an MP3 player, digital technology takes care of music. Before a portable MP3 player came into the picture, people had to carry large physical records or multiple CD packs but now, a small device can hold thousands of those same songs in it.

4 0
3 years ago
State<br> any three (3) reasons why users attach speakers to their computer?
lidiya [134]

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not <u>really</u> complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

4 0
3 years ago
Can somoene explain the function of-<br><br>def __init__():<br><br>In python programming language​
JulsSmile [24]

Answer:

def is a keyword used to define a function, placed before a function name provided by the user to create a user-defined function

__init__ is one of the reserved methods in Python. In object oriented programming, it is known as a constructor. Python will call the __init__() method automatically when you create a new object of a class, you can use the __init__() method to initialize the object’s attributes.

Example code:

class Person:

 def __init__(self, name, age):

   self.name = name

   self.age = age

p1 = Person("John", 36)

print(p1.name)

print(p1.age)

Summary

  • Use the __init__() method to initialize the instance attributes of an object.
  • The __init__() doesn’t create an object but is automatically called after the object is created.
8 0
3 years ago
Other questions:
  • What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float?
    14·1 answer
  • Can you help please.
    11·1 answer
  • Which port can connect you to the Internet through a telephone line?
    6·1 answer
  • A well-diversified portfolio needs about 20-25 stocks from different categories is this True or False?
    6·2 answers
  • Turning up the transmit power or utilizing a high gain antenna to reach wireless users from a distance increases your exposure t
    12·1 answer
  • 25 POINTS! PLEASE ANSWER! Karrie would like to draw attention to some short statements in her document. What is the best way to
    6·2 answers
  • Assume that ip has been declared to be a pointer to int and that result has been declared to be an array of 100 elements . Assum
    9·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?
    12·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!