1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
8

Carlos has noticed that he has a duplicate slide in his presentation. He would like to delete it. He should _____.

Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
8 0

Answer:

click on the slide in normal view and press delete

Explanation:

i don't know if this is right but you can click edit and delete it like that.

You might be interested in
Which of the following formats allow visual, video, and sound capability and can be uploaded to certain social networking sites?
insens350 [35]
It is Microsoft work
This is because
6 0
3 years ago
Beth’s multimedia business specializes in sound integration and editing. A New project requires video editing and the creation o
ANEK [815]

Answer:

A. Adobe illustrator

Explanation:

4 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
Most LO/TO hazards occur under the following circumstances, EXCEPT:
Vaselesa [24]

what are you asking? cause this is a werid question

7 0
3 years ago
Read 2 more answers
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Other questions:
  • Americans overwhelmingly support organ and tissue donation.
    5·1 answer
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • What does the shell of an operating system do
    14·1 answer
  • The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
    5·2 answers
  • What are the coordinates of the origin point? (Select the best answer.)
    10·1 answer
  • One way to prepare for filing the PROFILE is to:
    12·2 answers
  • Marie has never used a word processor. In 3 to 4 sentences, describe how she could benefit from using a word processor to comple
    7·2 answers
  • What do u think a creative app must have? <br><br> Please answer the question ASAP!!
    5·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    12·2 answers
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!