1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
8

Jasmine is a commercial artist her is is the one most often used by graphic designers publishers and others in her field the os

she most likely uses is
Windows
MS-DOS
Max
Linux
Computers and Technology
1 answer:
VikaD [51]3 years ago
7 0
OS is for mac so she used the mac computer
You might be interested in
Using a custom animation effect, how do you make text appear on a slide letter by letter?
solong [7]

Answer:

Apply an entrance effect, and then set it to By letter in the Effect Options dialog box.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

To format an image on PowerPoint, you can either use the Artistic Effects or Picture Effects.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Using a custom animation effect, in order to make text appear on a slide letter by letter, you should apply an entrance effect, and then set it to By letter in the Effect Options dialog box.

3 0
3 years ago
A report that ends with the author providing his or her plan for next steps is considered a
Angelina_Jolie [31]
The specific part of the report wherein the author would provide his suggestions on the next plans that would be carried out in the study would be the recommendations. In addition, it would open the opportunity to other aspiring researchers to expound and better improve the study.
4 0
3 years ago
To StaySafe while working near powerlines, you should______ to determine the safe working distance.
irina1246 [14]
Verify the lines voltage i believe is the right answer
8 0
3 years ago
Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician
sleet_krkn [62]

Answer:

Technician B is correct only

Explanation:

The actions of technician b helps to eliminate uneven rotating speed which causes vibrations.

6 0
4 years ago
If a destructive program is running that might be destroying evidence what should be done
Vikentia [17]
The choices can be found elsewhere and as follows:
a. perform an immediate full backup
b. attempt to end the process
c. pull the power cable
d. record the destruction using a video capture of the screen

I think the correct answer is option a. If a destructive program is running that might be destroying evidence, then perform an immediate full backup. 
3 0
3 years ago
Other questions:
  • ________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. quest
    12·1 answer
  • Help?!<br> Does anyone know how to use Adobe SoundBooth?
    14·2 answers
  • What is the advantage of defining a target user?
    6·1 answer
  • The primary benefit to the use of overlays in animation is that animators are able to
    12·2 answers
  • Decide what activity is most appropriate based on the temperature. If the temperature is greater than 80 degrees, then display t
    13·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    5·2 answers
  • What is a compiler? O a tool used to integrate multiple software programs O a tool used to extract a single software program fro
    13·2 answers
  • 2. The internet offers a great source of information; however, how are
    9·1 answer
  • 18) What is masking in Flash?
    5·1 answer
  • ________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!