1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
3 years ago
8

How might you use PowerPoint as a student, as an employee, or personally?

Computers and Technology
2 answers:
katen-ka-za [31]3 years ago
7 0

Answer: You can use a powerpoint as student for assignments, as an employee for presentations, and personally for taking notes.

Explanation:

Triss [41]3 years ago
5 0

<em>Hey there!</em>

Answer:

As a student, you might use PowerPoint to complete assignments and create presentations. When your teacher assigns an assignment that you need to share with the class, PowerPoint would be a good program to use.

As an employee, you can use PowerPoint to keep track of sales or data about your job. This way, you can easily show your boss what you have done over the past times you've been working. You can also advertise about your job depending on what your job is.

To use it personally, you can create photo montages of trips with a photo on each slide to share with friends. You can also keep track of chores or chore salaries.

The program PowerPoint can be used in so many ways for so many things, the rest is up to your imagination!

<em>Hope this helps  </em>:)

You might be interested in
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
4 years ago
Which of the following are examples of IT
Advocard [28]

Answer:

Computer hardware engineer

Systems analyst

Database administrator

7 0
3 years ago
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Whic
andrey2020 [161]

What's up!!! :D A Tech-Savvy here:

Answer:

Symmetric Digital Subscriber Line (SDSL)

Cheers,

Feel free to ask me anything regarding ICT/Tech.

7 0
3 years ago
(tco 8) the process of granting a user access to an application is called _____.
Scrat [10]

I guess the correct answer is Authentication.

The process of granting a user access to an application is called Authentication.

3 0
3 years ago
Other questions:
  • Which of the following cannot be created using Word software?
    15·1 answer
  • Impact of computer on education
    6·2 answers
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • Two or more computers that are linked together are called which of the following
    7·1 answer
  • . Database connectivity software is also known as:
    11·1 answer
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • Blind spots are those areas not reflected in your:
    7·2 answers
  • The data-linking feature that allows Internet users to skip directly from a highlighted word to a related file in another comput
    12·2 answers
  • Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
    5·1 answer
  • Write steps for converting decimal to binary numbers?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!