1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
12

Which option in PowerPoint allows users to configure the number of columns and rows manually, using numerical

Computers and Technology
2 answers:
kupik [55]3 years ago
7 0

Answer:

Insert Table dialog box

Explanation because i took the test

netineya [11]3 years ago
3 0

Answer: Excel spreadsheet

Explanation: I took a test with the same question

You might be interested in
What are some common security threats for our home devices and IoTs?
musickatia [10]

Answer:

  • Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.
  • A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
  • Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

6 0
3 years ago
In the maintenance phase of the waterfall model, the parts of a program are brought together into a smoothly functioning whole,
vivado [14]

Answer:

False

Explanation:

The maintenance phase of the waterfall model for software development involves making changes to the entire system or some parts of it for improved performance. Integration and testing is the step at which  all units developed at the implementation stage are brought together to form a whole functioning system. At this stage, the system is constantly checked for proper functionality so it can be deployed.

7 0
3 years ago
Match the items with their respective descriptions. to navigate between worksheets to protect a worksheet to change the position
Rzqust [24]
To navigate between worksheets
press Ctrl and Page Up or Page Down keys

to protect a worksheet
select a password

to change the position of a worksheet
drag the worksheet tab to the new position

to rename a worksheet
double-click the worksheet tab
8 0
3 years ago
Write the definition of a function named averager that receives a double parameter and return-- as a double -- the average value
lys-0071 [83]

Answer:

Following are the definition of function  

double averager (const double &x)  // function definition

{

static double z = 0.0;  // variable declaration

static size_t c = 0;

 c=c+1;  // increment of c by 1

z =z+ x;  // adding value  

return z /c ;   // return average  

}

Explanation:

Following are the description of statement  

  • Create a function averager of double type that holds a parameter "x" of the double type .
  • In this function we declared a variable "z" of a static double type that value is initialized by 0.
  • The static variable is used to retain value.
  • Declared a variable "c" of size_t type that holds a value 0 .
  • After that increment the value of c by 1 .
  • adding the value of "z" variable to the "x" and storing the result into the z variable.
  • Finally return the average value  
4 0
3 years ago
Cell phone producers charge a _____, which consumers pay to buy the phones. profit production cost price
alex41 [277]
The answer is price i have gone over this specific lesson multiple times.
4 0
4 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • Which of the following operating systems is open source?
    6·2 answers
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Which of the following has likely attended vocational school?
    10·1 answer
  • Write a fragment of code that will read words from the keyboard until the word done is entered. For each word except done, repor
    14·1 answer
  • Maia notices that her paragraphs are too close to one another. She wants to increase the space. Which arrangement of steps does
    6·2 answers
  • What is the output of the following code snippet? int s1 = 20; if (s1 <= 20) { System.out.print("1"); } if (s1 <= 40) { Sy
    6·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • 2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!