1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
9

Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s

teps and indicate the order in which they should be performed to move the slide. (For example, if an item describes what you do first, select 1.) Included in the list are items that are not part of the process. For these items, select N/A, an abbreviation for Not Applicable.
1 – first
2 – second
3 – third
4 – fourth
5 – fifth
6 – sixth
N/A – not applicable

_____Choose Move from the Tools menu.
_____Drag the slide where you want it.
_____Enter the slide position you want.
_____Hold down the mouse button.
_____Select the slide you want to move.
_____Switch to the Notes view.
Computers and Technology
2 answers:
NikAS [45]3 years ago
8 0
The answer should be
2
4
3
5
1
6
astra-53 [7]3 years ago
5 0

Answer:

2,4,3,5,1,6

Explanation:

The steps required to move a slide to a different location in a presentation are as follows:

2. Choose Move from the Tools menu.

4. Drag the slide where you want it.

3. Enter the slide position you want.

5. Hold down the mouse button.

1. Select the slide you want to move.

6. Switch to the Notes view.

                         OR

1. Select the slide you want to move.

2. Choose Move from the Tools menu.

3. Enter the slide position you want.

4. Drag the slide where you want it.

5. Hold down the mouse button.

6. Switch to the Notes view.

You might be interested in
Determine the output of the following code segment:
Nataly [62]

Answer:

The output to the given code as follows:

Output:

10

100

64

36

16

4

0

4

16

36

64

Explanation:

In the given java code, an integer variable "i" and an array number is defined, which size is 10, in the next step two for loop is declared, that can be described as follows:

  • In the first loop, array use loop variable "i" use, which minus the value of 5 and multiplies by 2, and it will calculate the square of that number.
  • In the next step, a for loop is declared, that prints these array number variable square.
7 0
3 years ago
Why can't cruise control work under 25 mph?
beks73 [17]
<span>At lower speeds modulating speeds is a must for safety. I would be hard pressed to find a place in town you could drive 25 mph for an extended time. Also, plan on a lot of shifting at lower speeds. That completely negates using the cruise on a manual and really puts the auto in the hunting mode. I would think it safer that you move the selector into a lower gear to get some engine braking at say, 25 mph which would make it easier to sustain the speed rather then use the cruise.

Brainliest please?</span>
4 0
3 years ago
In a folder hierarchy, the top level is referred to as which of the following?
Vesnalui [34]

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

4 0
3 years ago
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
4 years ago
Select the correct answer.
Vsevolod [243]

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

3 0
3 years ago
Other questions:
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • How can people efficiently and effectively influence lots of people throughout the world
    13·1 answer
  • A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
    7·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
    6·1 answer
  • The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
    9·1 answer
  • Who would win in a fight iron man or bat man​
    5·2 answers
  • Explain how SEO impacts the way you should interpret search engine results ???
    6·1 answer
  • Why did the i have a dream speech happen
    8·1 answer
  • How many bits would be needed to count all of the students in class today? There are 40 students.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!