1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
10

Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure

that the video will play even if an internet connection is not active during the presentation. What should he do?
Use an embed code.
Use the Online Video command in the Media group.
Use the Video from my PC command in the Media group.
Use pictures instead because this cannot be done.

(2)
Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utilizing multiple monitors or a projector?

Normal view
Annotation tools
Presenter view
Notes tools

(3)
Which option should Gina click to edit the text contained in a text box on a slide in her presentation?

rotation handle
sizing handle
expansion handle
text box
Computers and Technology
2 answers:
Masteriza [31]3 years ago
6 0

Answer:

For your first question, it is D. Use pictures instead because this cannot be done.  For your second answer, it is C. Presenter view.  For your final question, it is D. Text box.

If I am not correct, I am very sorry!-

Have a good day! ^^

VikaD [51]3 years ago
5 0
D for the first one that’s all ik
You might be interested in
In a proper webpage, which tag holds all of a webpages visble HTML
Furkat [3]
If I remember correctly, I believe it's <body></body>
6 0
3 years ago
Read 2 more answers
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
Most users find settings between ____ to be the most convenient option for how long the computer sits idle before the screen sav
Sphinxa [80]
I would say about 5 to 10 minutes
3 0
3 years ago
Write an expression that will cause the following code to print "Equal" if the value of sensorReading is "close enough" to targe
Likurg_2 [28]

Answer:

The program to this question as follows:

Program:

targetValue = 0.3333 #defining variable targetValue and assign value

sensorReading = 0.0 #defining variable sensorReading and assign value

sensorReading = 1.0/3.0 #calculate value in sensorReading variable

Val=sensorReading - targetValue

#calculate the difference and store in Val variable

if (Val < 0.0001): #use of if block to check condition

  print ("Equal")  #print value

else:  #else block

  print ("Not equal") #print value

Output:

Equal

Explanation:

In the above Python program code, there are two variables "targetValue and sensorReading" is defined, in which targetValue store a value, that is "0.3333", and sensorReading holds a value, that is "0.0".

  • In the next step, the "Val" variable is defined, that calculate the difference between both variable, that conditional statement is used.
  • In if block, if the value is less then "0.0001", it will print value "Equal", otherwise, it will go to the else block, that will print "Not equal".
3 0
3 years ago
Read 2 more answers
Whos really watching this guys bruh​
Ivahew [28]

Answer:

Me no

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In a social networking site your personal information is listed under your inbox. home. status. profile.
    11·1 answer
  • Distinguish the functional requirements an engineer would have to specify for a taxi dispatch system.
    8·1 answer
  • A paradigm innovation occurs when:
    6·1 answer
  • Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two
    11·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • Write a C program to input a character, then check if the input
    5·1 answer
  • Write a program that inputs numbers and keeps a
    8·1 answer
  • QUESTION 1
    6·1 answer
  • what is the correct process for setting up a recurring project for the same client in qbo accountant?
    14·1 answer
  • what field in the ipv4 datagram header can be used to ensure that a packet is forwarded through no more than N headers
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!