1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
5

~50 points~ how do you merge shapes in powerpoint

Computers and Technology
2 answers:
mojhsa [17]3 years ago
5 0

Answer:

Merge shapes

Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...

On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.

Explanation:

Romashka-Z-Leto [24]3 years ago
5 0

Answer:

Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...

On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.Explanation:

You might be interested in
How to reload ingenuity when a pulsating blue thing is there
Hatshy [7]
Todo is very important
4 0
3 years ago
Is a bottle opener considered an engineered item?
KIM [24]
Yes actually it is it’s a machine to use for opening bottles such as cans n other
3 0
3 years ago
So I emailed Brainly to deleted my account. Why haven’t they done so yet? I don’t want to get charged money for this app I was p
joja [24]

Answer:

Go to the Use the profile settings page. Click on "I want to delete my account" button located inside the Privacy tab on your profile settings page. Enter your Password.

Explanation:

8 0
3 years ago
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
tensa zangetsu [6.8K]

Answer:

A. Multifactor authentication

Explanation:

Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.

A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.

8 0
3 years ago
You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every day
Vika [28.1K]
Those who use pirate software:
<span>1)Increase the chances that the software will not function correctly or will fail completely
2)Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes
3)Have no warranty to protect themselves
4)Increase their risk of exposure to a debilitating virus that can destroy valuable data
5)May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy
6)Are subject to significant fines for copyright infringement</span>
5 0
3 years ago
Other questions:
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • What do you think of my profile picture
    8·2 answers
  • I have a question on an IT crossword the question is as follows
    12·1 answer
  • Exploring Arraylists. Remember that arraylists are good for adding and removing things, and that they are clock-cycle friendlier
    13·1 answer
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • My friend has a battery of 9000mah and loses 10 every day how many days well it take to go to zero
    13·1 answer
  • While (e &lt; 10):<br> print (c)
    10·1 answer
  • Please help I really need it :(
    12·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!