Answer:
.JPEG
.PDF
.pptx
General Concepts:
<u>Google</u>
- Slides has an option to download a wide multitude of formats
Explanation:
If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.
Attached below is an image of the options.
Answer:
Here is c program:
#include<stdio.h>
#include<conio.h>
void main()
{
//Variable declaration
//array to hold 6 values you can change this as needed
float nums[6];
//integer i is for loop variable
int i;
//to hold maximum value
float max=0.0;
//clear screen
clrscr();
//iterate 6 times you can change as per your need
for(i=0;i<6;i++)
{
printf("Enter a number:");
scanf("%f",&nums[i]);
//check if entered value is greater than previous value
//if it is greater then assign it
if(nums[i]>max)
max = nums[i];
}
//print the value
printf("The largest number entered was %f",max);
getch();
}
Explanation:
Answer:
True is the correct answer for the above question.
Explanation:
- The social website is used to connect the people using the internet to communicate. With the help of this, any people can communicate within the world's people.
- If anyone posts their pictures or comment on this type of website, then they need to care for that post or pictures. it means he needs to make decisions to choose the pictures or comments while posting.
- It is because when the user posts the wrong comments or pictures, then their popularity is less in front of the other people called society.
- This concept is also said by the question, hence it is a true statement.
I suspect the answer they're looking for is false. However, as an experienced professional in learning and development, I can tell you that when done right these effects can enhance a presentation.
Answer: (C) Ransomware
Explanation:
The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.
The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.
It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.
Therefore, Option (C) is correct.