1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
9

What is presentation software in bussiness used for

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
7 0

Answer:

Presentation software is a category of application software that is specifically designed to allow users to create a presentation of ideas by stringing together text, images and audio/video.

Explanation:

You might be interested in
The average American has 10 devices, ask for users average number of devices. Any number between 7 and 12 will print “you have a
Juli2301 [7.4K]

This is for Python

device_num = int(input('How many devices do you have: '))

if device_num >= 7 and device_num <= 12:

   print('You have an average number of devices')

if device_num > 12:

   print("You're beyond the average range")

5 0
3 years ago
What will Jason need to assemble a microcomputer and connect it to memory chips
lisabon 2012 [21]

会いたいんだ

愛したいんだ

その愛がもう今見たいんだ

会いたいんだ

愛したいんだ

今かっさらう So watch out now!

6 0
3 years ago
I want to discard my old computer and want to securely erase the data from my hard drive what is the process called.
laiz [17]
I believe the process is called High Level Format.
8 0
4 years ago
Read 2 more answers
Draw any five (5) basic symbols used for flowcharting
Mekhanik [1.2K]

Answer:

Image below ⏬

6 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Other questions:
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • Differences between mechanical and optical mouse <br>Plz help me
    6·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • Excel allows you to rotate text in a cell counterclockwise by entering a number between -1 degrees and -90 degrees. True or fals
    14·1 answer
  • Which activity represents a violation of the licensing agreement?
    13·2 answers
  • Implement the Dining Philosophers problem (described on pages 167-170 in the textbook (chapter 2.5.1)). Create a Graphical User
    13·1 answer
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • Mr. O would like to purchase a new computer for his home business. Mr. O's current computer runs very slow when he is running e-
    5·2 answers
  • Why is it important to install updates? Why should you use the Power button on the Start menu instead of the Power button on you
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!