1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
14

T F 5. You can save presentations in PDF and XPS formats.

Computers and Technology
1 answer:
S_A_V [24]3 years ago
7 0
True, presentations can be saved as PDF’s it will come out as separate pages though
You might be interested in
You are the system administrator for Precision Accounting Services, which employs 20 accountants and 25 accounting assistants. T
Naddik [55]

What can  be done is to provide the computers with  remote access.

<h3>What is Remote access?</h3>

This involves the use of softwares that enables a single computer to view

or control others from any area.

Adopting this method means all the workers will have access to a

consistent desktop experience no matter which computer they sign in to

for work.

Read more about Remote access here brainly.com/question/26327418

4 0
2 years ago
It was field day for the upper grades at Rock Creek School,
Mariulka [41]

Answer:

its c

Explanation:

8 0
3 years ago
A paradigm innovation occurs when:
Viktor [21]
B. Because major shifts in thinking can cause change.
4 0
3 years ago
Can someone pelaseee help
aalyn [17]

Answer:

Explanation:

develloppemetn de grace en option est logiquement une biologiste experimenter des annes 1256 a toulouse en france

6 0
2 years ago
Proxy is a network computer that can serve as an intermediary for connecting with other computers.
Keith_Richards [23]

Answer:Protects the local network from outside access

Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .

8 0
3 years ago
Other questions:
  • _____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
    12·1 answer
  • Briefly outline what LCD screen contain on the inside and why shouldn't it be opened by someone who is not qualified to work wit
    13·2 answers
  • What is UNIX? A program for writing documents Graphical interface Internet browser Operating system
    8·2 answers
  • The correct ordering of the seven layers from "top" to "bottom" is
    11·1 answer
  • You can apply several different worksheet themes from which tab?
    6·2 answers
  • Deleting anitem from a linked list is best when performed using two pointersso that the deleted item is freed from memory.
    7·1 answer
  • How do you determine which type of operating system that best supports your computer or mobile device?
    5·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
  • Difference between hacking and cracking not hackers and crackers ​
    10·1 answer
  • 2023 murano’s available intelligent awd adjusts the ________ to help maintain cornering control.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!