1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
10

What are the steps to customize a slide show?

Computers and Technology
2 answers:
hodyreva [135]3 years ago
6 0

Answer:

Third one

Explanation:

Lemur [1.5K]3 years ago
4 0

Answer: Third one

Explanation: I got it right

You might be interested in
Suppose you are choosing between the following three algorithms:
Pavel [41]

Answer:

Algorithm C is chosen

Explanation:

<u>For Algorithm A </u>

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

6 0
3 years ago
how to make assignment on power point plz cntct me and help me all about power point and my assignment is prime ministers of pak
masha68 [24]

i can help you make a power point but idk anything about prime ministers of pakistan

5 0
3 years ago
A two part circular linked chain implementation of a queue
dem82 [27]

Answer:A) All other answers

Explanation:

Circular linked chain is the type of the linked list formed that has the first component attached to the last component and every other are connected consecutively .

The circular linked list which is in two section is implemented in the form queue by the methods such as the initializing the nodes and using them when there is the requirement of it or it can also keep the node for the future use.

6 0
3 years ago
This is your code.
Sever21 [200]

Construct d

  • d=[[5,10,15],[2,4,6],[11,33,55]]

So

d[2] is c i.e [11,33,55]

d[2][1]=c[1]

So it's 33

3 0
2 years ago
Final Instructions Your company ABC Consulting Company is asked to provide a proposal for the upcoming company expansion. You wi
Lera25 [3.4K]

Answer:

See attached images for the topology and total costing

4 0
3 years ago
Other questions:
  • According to the Big Five Factors model, all but _____ are categories.
    11·1 answer
  • What is a DreamScape?<br> Explain <br> and give example (if you want)
    10·1 answer
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • 18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
    7·2 answers
  • Cell references in a formula are called _____.<br> a. assumptionsc. numbersb. valuesd. content
    11·1 answer
  • 7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
    5·1 answer
  • When adding shapes to a presentation, the outline can be one color, and the fill must be the exact same color.
    12·2 answers
  • Determine the exact output of the code $str = "The quick brown fox jumps over the the lazy dog"; echo strpos($str, 'fox');
    6·1 answer
  • Which type of memory helps in reading as well as writing data?
    7·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!