1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
11

Which of the following popular presentation software items do you have to purchase in order to use?

Computers and Technology
2 answers:
viva [34]3 years ago
8 0
I think it’s b because it’s part of
Microsoft and Microsoft always wants you to spend money
Leona [35]3 years ago
5 0

Answer:

Microsoft PowerPoint

Explanation:

Microsoft PowerPoint is part of the Microsoft Office Suite that requires money to purchase and use.

You might be interested in
Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so
lara [203]

Answer:

The answer is "standoffs ".

Explanation:

It is rolling metal or plastic pins, which is used to divide the computer frame from the chipset are stiffer springs or pauses. It unplugs the desks, and unscrew the fasteners, which keep the board on to the cases to remove the piece.

  • It is a fixed size hooked divider used only to elevate each element above others and in such an ensemble.  
  • It is generally round or hex, typically made of copper, brass or nylon.
6 0
3 years ago
What is one reason why a business may want to move entirely online?
andrezito [222]

Answer:

To focus on global market

Explanation:

Hope this helps! :)

3 0
3 years ago
Choose the best answer from the options below to complete the following sentence.
Lemur [1.5K]

Answer:

its A. the answer to your question is preserved. :)

7 0
2 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
4 years ago
In which area of the screen can features and functions of Word be accessed?
abruzzese [7]

Answer:

Toolbar

Explanation:

j don't know if you meant that instead of scroll bar, but tool bar is the answer

5 0
3 years ago
Other questions:
  • Which of the following is a justification for giving a Page Quality (PQ) rating of Lowest? Select all that apply. True False The
    7·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • Constraints are a. quantities to be minimized in a linear programming model. b. quantities to be maximized in a linear programmi
    5·1 answer
  • Which of the following is software? : Monitor Mouse Windows Keyboard Printer
    13·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • Please help and answerr
    8·1 answer
  • Help asap !!!<br>which component of cpu controls the overall operation of computer..​
    9·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • How Powerpoint is useful in education aspect?
    5·2 answers
  • Hi everyone can anyone tell me how to align the photo the right in code.org
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!