1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
4 years ago
13

Beth wants to add information to her PowerPoint presentation that is hidden from her audience and only she will

Computers and Technology
1 answer:
Veseljchak [2.6K]4 years ago
4 0

Answer:

howdy

Explanation:

You might be interested in
Which are the best examples of costs that should be considered when creating a project budget?
Vlada [557]

Answer:

I would say material costs and hiring costs, idk if that helps or not

4 0
3 years ago
A search engine attempts to catalog every Web page by topic through the use of a ____
-BARSIC- [3]
<span>A search engine attempts to catalog every Web page by topic through the use of a spider (web crawlers). </span>
8 0
4 years ago
All of the following are characteristics of a 4 year college except
klasskru [66]
D they offer few programs
4 0
4 years ago
Read 2 more answers
Help me please, I'm attempting a test<br>​
dusya [7]
It’s A it’s a keyboard
8 0
3 years ago
Read 2 more answers
What does the use of color and images on a blog refer to?
serious [3.7K]
I think marketing and branding. i dont think this is 100% correct
8 0
3 years ago
Read 2 more answers
Other questions:
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • Assume that another method has been defined that will compute and return the student's class rank (Freshman, Sophomore, etc). It
    8·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Use the syntax SELECT ________ (expression) [Column Name] to limit the result set to the number of rows defined by the expressio
    10·1 answer
  • Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
    6·1 answer
  • What is a characteristic of high-level languages?
    15·1 answer
  • Which of the following statements best illustrates how value was created for eggs? when a farmer sells a chicken who is no longe
    9·1 answer
  • How to write my name in binary code ? Rivas
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!