1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
6

In which view of PowerPoint is the Annotation tools menu available?

Computers and Technology
2 answers:
lara31 [8.8K]3 years ago
7 0

Answer:

2.

Explanation:

Annotating in PowerPoint is the create notes while delivering a PowerPoint presentation. This could be done in two ways.

First, right click with the mouse and select 'pointer options'. Then you can choose either pen or highlighter to circle certain word or highlight any line.

The second way of creating annotation is by going to View→Normal→Notes.

After you select 'notes', a pane will appear at the bottom of your presentation.

So, the correct answer that annotation tools menu is available in Normal. Thus option 2 is correct.

Daniel [21]3 years ago
6 0

Answer:

Normal

Explanation:

You might be interested in
What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet?
natima [27]

Answer:

lawyer

Explanation:

by helping my society in terms of solving land cases that have been not settled in our history

7 0
3 years ago
Dakota's friend Stephen created a cypher using the QWERTY keyboard, but Dakota is confused. Stephen said to move one to the righ
Radda [10]

Answer:

people are so confusing nowadays... Mr. Kopin told me to get him a coffee. I'm not his servant!

Explanation: QWERTY Q=P A=L Z=M and the others are what is to the left of them.

5 0
3 years ago
Define a structure Triangle that contains three Point members. Write a function that computes the perimeter of a Triangle . Writ
qwelly [4]

Answer:

The program in C++ is as follows:

#include <iostream>    

using namespace std;

int perimeter(int side1, int side2, int side3){

return side1+side2+side3;

}

struct Triangle  {

int side1;  int side2;   int side3;

};

int main(void) {

int side1, side2, side3;

cout<<"Sides of the triangle: ";

cin>>side1>>side2>>side3;

struct Triangle T;

T.side1 = side1;

T.side2 = side2;

T.side3 = side3;  

cout << "Perimeter: " << perimeter(T.side1,T.side2,T.side3) << endl;

return 0;

}

Explanation:

See attachment for complete code where comments are as explanation

Download cpp
7 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Adding _______ around calculations indicates which calculations should be performed first before following the typical order of
Finger [1]

Adding parenthesis around calculations indicates which calculations should be performed first before following the typical order of operations. Correct answer: DThe order of operations is the order in which all algebraic expressions should be simplified is the following: First should be calculated expressions with parentheses, then exponents (and Roots) means power , then multiplication & Division and at the end Addition & Subtraction.

5 0
3 years ago
Read 2 more answers
Other questions:
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • Cell height can be changed by. Select all that apply
    15·2 answers
  • An example of a current disruptive technology is a?
    8·2 answers
  • Identify the benefit of modeling to communicate a solution. ​
    11·2 answers
  • What is the name given a technological program that typically copies itself and moves through a computer system in order to disr
    10·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • Describe advantages and disadvantages for microprocessor controlled devices in the household.
    7·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • Which storage is faster than secondary storage​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!