1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
11

Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the

slide thumbnails to the left of the main view?
A. He can right-click on Slide 6, then choose “Insert Before” and select Slide 8 from the options given.
B. He can right-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 6.
C. He can left-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 5.
D. He can left-click on Slide 6, then choose “Move To” and select Slide 8 from the options given.
Computers and Technology
2 answers:
uranmaximum [27]3 years ago
8 0

Answer:

C

Explanation:

Most programs for slides allow the individual to click and drag a slide where it belongs.

Thepotemich [5.8K]3 years ago
4 0
C is the answer , it’s very easy
You might be interested in
) What is the ""Phantom Inspector""? (
matrenka [14]

Answer:

 Phantom inspection is the process of finding various defects in the documents according to the . Basically, it is a group of meeting that usually provide the synergy effects and the maximum defects can easily be detected. This entire process is known as phantom inspector.  

It is also made some assumptions regarding the inspection that is made by one and more than one individual.

This process are usually done by inspecting the each operation output with the given output requirements.

4 0
3 years ago
Where can I learn how you hack?​
morpeh [17]

Answer:

www.udemy.com

5 0
3 years ago
Read 2 more answers
Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The method prints to stan
Bond [772]

Answer:

public static void printDottedLine()

{

  System.out.println(".....");

}

Explanation:

The above written code is in JAVA and it is the method definition of the method mentioned in the question.Since the method returns nothing hence it's return type is void and it does not have any arguments hence there is nothing written in the parenthesis.In JAVA System.out.println is used for standard output and trminates them by newline.

3 0
3 years ago
An Internet service provider that wants to influence consumers to immediately switch to its service would most likely utilize __
frutty [35]

Answer: Direct competitive

Explanation:

 The direct competitive situation occur when the two and more than two business in the market offering the similar type of services and the products so it automatically increase the level of competition in the market.

According to the question, the internet service is one of the most efficient tool for influence the customers or consumers about their products in the market and when the services are get switched then it utilize the direct competitive in the market.

Therefore, direct competitive is the correct option.

6 0
3 years ago
Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from
lana66690 [7]

Answer:

Remote Desktop

Explanation:

This is a software, that enable you to connect with a remote computer with all access. e.g. Team Viewer

3 0
3 years ago
Other questions:
  • What is a good voltage measurement on a brand new, 6 volt golf cart deep cycle battery after the first charging?
    10·1 answer
  • What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
    6·1 answer
  • True or False? Most operating systems allow the user to specify a set of paths that are searched in a specific order to help res
    5·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Gregory Yob is associated with which of these games?
    7·2 answers
  • Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n =
    14·1 answer
  • Consider the following code segment.
    11·1 answer
  • Match the elements of a web page with their descriptions.
    12·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
  • you want to run your campaign for your dry-cleaning service across three different publishers, each with different video creativ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!