1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
9

Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s

teps and indicate the order in which they should be performed to move the slide. (For example, if an item describes what you do first, select 1.) Included in the list are items that are not part of the process. For these items, select N/A, an abbreviation for Not Applicable.
1 – first
2 – second
3 – third
4 – fourth
5 – fifth
6 – sixth
N/A – not applicable

_____Choose Move from the Tools menu.
_____Drag the slide where you want it.
_____Enter the slide position you want.
_____Hold down the mouse button.
_____Select the slide you want to move.
_____Switch to the Notes view.
Computers and Technology
2 answers:
NikAS [45]3 years ago
8 0
The answer should be
2
4
3
5
1
6
astra-53 [7]3 years ago
5 0

Answer:

2,4,3,5,1,6

Explanation:

The steps required to move a slide to a different location in a presentation are as follows:

2. Choose Move from the Tools menu.

4. Drag the slide where you want it.

3. Enter the slide position you want.

5. Hold down the mouse button.

1. Select the slide you want to move.

6. Switch to the Notes view.

                         OR

1. Select the slide you want to move.

2. Choose Move from the Tools menu.

3. Enter the slide position you want.

4. Drag the slide where you want it.

5. Hold down the mouse button.

6. Switch to the Notes view.

You might be interested in
A(n) ____ backup only archives the files that have been modified since the last backup.
NemiM [27]

The answer is incremental backup as this is the one responsible of having to provide a backup with files that are modified since the last backup it has received, it is considered to be a backup in which is a type of security copy.

3 0
3 years ago
A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
Anna35 [415]
<span>A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.</span>
7 0
3 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
The method of loci, peg-word system, substitute word system, and method of word association are all examples of _____.
Yakvenalex [24]
The answer is Mnemonic devices

Mnemonics enable us remember things more easily and often refer to such internal strategies like reciting a rhythm or reciting the order of colors of the rainbow. In cognitive psychology of memory, peg-word method, keyword method, and the method of loci are discussed as formal mnemonic techniques.



5 0
3 years ago
What is heaven backwards?
sweet-ann [11.9K]
It is Nevaeh backwards hope that helps! :3 and feel free to pm me if you have anymore questions! :3
5 0
3 years ago
Read 2 more answers
Other questions:
  • A/An ___ is a series of instructions or commands that computer follows used to create software
    10·2 answers
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    13·2 answers
  • ) Which is true about the agile method?
    7·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Which of the following is not a hazard a driver might encounter?
    5·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • Which of the following has the greatest impact on telecommunications design?
    12·2 answers
  • Please answer this question​
    8·1 answer
  • Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!