1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
9

11. In MS PowerPoint

Computers and Technology
1 answer:
Grace [21]3 years ago
4 0

Answer:

slide sorter view .....

You might be interested in
3. Create mode was one of the most innovative and influential features of which of the following games?
melamori03 [73]
FarmVille would be the correct answer because it is a game where you build a create your own farm without nobody telling you to this or that
8 0
3 years ago
A drive is small enough to be carried in one's pocket.
hjlf

Answer: Pen

Explanation:

4 0
3 years ago
Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal pla
PolarNik [594]

Using the knowledge in computational language in C code it is possible to write a code that organizes and calculates the value of the matrix of A*A and that is in up to 4 decimal places.

<h3>Writing the code in C is possible:</h3>

<em>A=[1 2 2;3 4 5;6 7 8];</em>

<em>[u ,s ,v] = svd(A);</em>

<em>k = 1;</em>

<em>A1 = u(:,1:k)*s(1:k,1:k)*v(:,1:k)'; %'</em>

<em>RMSE = rms(sqrt(mean((A - A1).^2)))</em>

See more about C code at brainly.com/question/17544466

#SPJ1

3 0
2 years ago
The ____ command is used to disconnect a datatable object from the database. (
lisabon 2012 [21]
The delete from command I think
7 0
3 years ago
Read 2 more answers
The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
Reil [10]

SSIDs should separate each network.

(d)SSIDs

<u>Explanation:</u>

In an organization or corporation office, End user is office staff he or she can access to different SSIDS, Where restrictions access can be configured at firewall level.

So if any guest he or she will ask to connect different SSIDS so that guest will not enter to internal networks. Where guest is connected to only on restricted area network such as internet etc.  Due to this if guest pc is attacked by virus it can prevented by attacking the same to internal office network.

7 0
3 years ago
Other questions:
  • 9. The best way to insert an existing Excel chart into a document is to A. use the Object command. B. click the Insert tab and c
    6·2 answers
  • Where is authorization management app on tablet?
    7·1 answer
  • Why is it important to respect other political opinions
    7·2 answers
  • The___provides access to the internet; may also be internal
    11·1 answer
  • A model is replica that?
    11·2 answers
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • Which of the following countries have mixed-market economy
    5·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • Plz hurry it’s timed
    5·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!