1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
2 years ago
7

PLEASE HELP ME HELP ME NO IM NOT OKAY AND ITS NOT EASY FOR ME.....Vladimir is reworking an old slideshow. He needs to delete som

e of the text, combine or summarize other parts, and create a few new slides as well. He wants to only look at the text. Is there any easy way to do that?
A.
Yes, he can use the Outline view to see all the text in one place.
B.
Yes, he can use the Slide Master to view all the text in one place.
C.
No, he'll have to use the Slide pane to navigate the slides one by one.
D.
No, he'll have to copy all the text out into a word processor.
Computers and Technology
1 answer:
Mandarinka [93]2 years ago
7 0

Answer:

Outline view

Explanation:

This is a formatted window that shows all text, headers, and titles in a popup on the left side of the screen. Slide master shows all the slides but includes slide details such as inserted images and smart art.

You might be interested in
How can you represent a graphic element in a wireframe?
rusak2 [61]

Answer:

The answer is "in the form of design, color and graphic".

Explanation:

The wireframe is also recognized as 'skeleton', it is a static, low-fidelity description of various layouts, which provides shapes to the component. It is indeed a visualization of even an interface using only basic shapes.

It is a 2D illustration of a site user interface, which primarily focuses on capacity planning and priority of information, features available, and role expectations like, storyboards which do usually not include design, color, or graphics.

3 0
3 years ago
What is the main purpose of a graphic organizer?
timama [110]
B. To organize information using shapes.
8 0
3 years ago
Read 2 more answers
Select the correct answer.
Dvinal [7]

Answer:

A

Explanation:

because when you make a presentation so you are already use technology

4 0
3 years ago
What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?
Natasha2012 [34]

Explanation:

software must be used by well trained staff.

6 0
1 year ago
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Other questions:
  • In apersuasive message, opposing ideas should be:
    13·1 answer
  • select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
    9·2 answers
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • Given a number count the total number of digits in a number
    12·1 answer
  • The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False
    9·1 answer
  • Consider the method get Hours, which is intended to calculate the number of hours that a vehicle takes to travel between two mil
    6·1 answer
  • Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
    12·1 answer
  • What stipulates that the source code of any software published under its license must be freely available.
    14·1 answer
  • balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!