1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
14

Complete the steps for saving a presentation as a poi file,

Computers and Technology
1 answer:
mars1129 [50]3 years ago
4 0

Answer:

Click on the F

Copy & Print

Next, click on

Last, click

Send

Save As

Explanation:

This is because save means it will save your file as the same you have made but drop do means to cut or don't save the file that's why it should be the second one means:Click on the F

Copy & Print

Next, click on

Last, click

Send

Save As

You might be interested in
What will the document.write() statement display, given the following code snippet? var scores = new Array[94, 90, 88, 82, 73, 7
astra-53 [7]

Answer:

There are 7 scores recorded. The dropped score is 75

Explanation:

The code snippet above prints through the document.write() function. the output prints the string serving as the argument, and makes use of variables (lgth) and expression also (scores [lgth -1]). what it does is. From the point where it sees +lgth+, it checks the value, which is 7. And when it sees scores [lgth-1] it evaluates it to 75. Hence, the string above is produced.

4 0
3 years ago
)1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
Darina [25.2K]

Answer: Single  precision

Explanation:

A 1-bit sign, 8-bit exponent, 23-bit fraction and a bias of 127 is used for the single precision binary floating point representation. As, single precision is the smallest change that can be represented as floating point representation is called as precision. It is the computer format number, which occupies 32 bits in the computer memory.

The IEEE standard specify a binary 32 as:

Sign bit- 1 bit

Exponent width- 8 bits

Significant and precision- 24 bits (23 stored as explicitly)

7 0
3 years ago
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
RideAnS [48]

<u>Explanation:</u>

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

  • They help detect security loopholes before a cyberattack.
  • They determine how vulnerable a network or computer program is.
  • They advise the IT firm's security teams on how to mitigate vulnerabilities detected.

7 0
3 years ago
Drag the system component on the left to the device or program that fits with the system component.
Strike441 [17]

Answer:

A. Back up software - Utility software

B. Printer - Device drivers

C. Camera - Firmware

D. Television - Firmware

E. Games console - Firmware

F. Antivirus software - Utility software

G. Disk Cleaner - Utility software

H. Video Card - Device drivers

Explanation:

Computer system components are the physical or hardware and software parts of the device. It is a combination of system software like utility software, device drivers and firmware, application software, and the hardware components and kernel.

4 0
3 years ago
The closing of the letter should have at least
asambeis [7]

Answer:

Im unclear exactly what it is saying but i think its 2

7 0
3 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • The function of a start winding in a split-phase motor is to A. provide the starting torque. B. reduce the starting current. C.
    14·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document? Annotation Bookmark Comment Highlight
    7·2 answers
  • The icacls.exe command adds __________, which are visible by clicking the Advanced button in the folder Properties dialog box
    15·1 answer
  • What is done to conserve energy while electricity is being transported?
    9·1 answer
  • What do you think is the biggest threat to the security of your personal information?
    5·2 answers
  • How should you best communicate<br> this information to Keisha?<br> (Select all that apply.)
    13·1 answer
  • What will happen when you drag and drop a worksheet tab into another workbook WITHOUT holding the Ctrl key down?
    13·2 answers
  • How are PivotCharts different from regular charts?
    12·1 answer
  • Congress are smart becuase.....
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!