1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
11

Which are ways action buttons can be used in presentations?

Computers and Technology
2 answers:
Anarel [89]3 years ago
8 0
You could Do Ctrl + F5 to present your google slides

You could Animate Objects/Units by one of the drop down menus in google slides

You could add a link by copying the link you want to put in by highlighting the link, pressing Ctrl + C (to copy) and Find where you would like to place it and press Ctrl + V
(To Paste)

If you press on a google slide and do not do anything else, at the top it should say theme Or background, there you could select a image from your device or a solid color or Gradient of a color for your background.
Luda [366]3 years ago
6 0
You could Do Ctrl + F5 to present your google slides

You could Animate Objects/Units by one of the drop down menus in google slides

You could add a link by copying the link you want to put in by highlighting the link, pressing Ctrl + C (to copy) and Find where you would like to place it and press Ctrl + V
(To Paste)

If you press on a google slide and do not do anything else, at the top it should say theme Or background, there you could select a image from your device or a solid color or Gradient of a color for your background.
You might be interested in
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
Use ordinary pipes to implement an inter-process communication scheme for message passing between processes. Assume that there a
Naya [18.7K]

Answer:

Yup

Explanation:

6 0
3 years ago
The ____________________ of a function consists of the function name and its formal parameter list.
storchak [24]
Function signature I think
8 0
3 years ago
What does rumor Mean Cause I don't know what it means
aksik [14]
Its like a fake message that people believe. for example say that jimmy went to a party. people might start making up things about what happened with him to make gossip. Rumors are not always true, and they are fake a lot of the time. 
8 0
3 years ago
Read 2 more answers
 A network engineer is examining a configuration implemented by a new intern who attached an IP phone to a switch port and confi
lakkis [162]
Where is the answer?????????

7 0
3 years ago
Other questions:
  • 9. Name at least two types of hard drives?
    6·1 answer
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • How do I get more points?
    13·2 answers
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
    9·1 answer
  • "The ability to create methods with the same name that are in different classes" is known as ________.
    14·1 answer
  • The first step to accurate coding is to identify the ___________ in the diagnostic statement.
    7·1 answer
  • Which screen should be open to customize or personalize a desktop background?
    15·2 answers
  • Application of computer in insurance​
    14·1 answer
  • Plsssssssss help me​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!