1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
4 years ago
13

Beth wants to add information to her PowerPoint presentation that is hidden from her audience and only she will

Computers and Technology
1 answer:
Veseljchak [2.6K]4 years ago
4 0

Answer:

howdy

Explanation:

You might be interested in
4. Who developed the first design technology program which had a
HACTEHA [7]

Answer:

Macintosh.

Explanation:

Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI).

Macintosh developed the first design technology program which had a mouse and allowed for photo manipulation. This technology or software program used for photo manipulation is known as MacPaint, it was a raster graphics editor which was originally coded by Bill Atkinson using a Pascal programming language while its graphical user interface was designed by Susan Kare.

5 0
3 years ago
X = 9 % 2if (x == 1):  print ("ONE")else:  print ("TWO")
IgorC [24]

Answer:

ONE

Explanation:

It prints one because % is modulus, which is remainder division. It divides the numbers provided and returns the remainder of the division. 9 / 2 = 4 with 1 remainder, which leads us to our answer.

4 0
2 years ago
What action should you take if you become aware that sensitive compartmented information has been compromised
irina [24]

The sensitive compartmented information can not be compromised and in case found with the incident it must be reported to the security officer.

<h3>What is Sensitive Compartmented Information?</h3>

The sensitive compartmented information is given as the sensitive information to the United States gathered with the source of the intelligence and the analytical process.

The information has been sensitive and was considered not to be compromised. In case the information is found to be compromised, the security officer of the information must be contacted to check into the details.

Learn more about sensitive information, here:

brainly.com/question/25948574

#SPJ1

5 0
2 years ago
A quick boot allows you to do what?
WITCHER [35]
Access the BIOS setup
6 0
3 years ago
Read 2 more answers
-Define three types of user mode to kernel mode transfers?
Ivahew [28]

Answer:

 The three types of user mode to the kernel mode transferred occurred due to the:

  • It is mainly occurred due to the interrupt when, it send to the central processing unit (CPU).
  • It also occurs due to the hardware exception and when the memory is access illegally as it is divided by the zero.
  • It is mainly implemented or executed by the trap instruction as the system are basically executed by the program.
7 0
3 years ago
Other questions:
  • We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
    15·1 answer
  • Mia is attending a team meeting to discuss how to prevent accidents. One of her teammates suggests pushing all the desks against
    15·2 answers
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • What is the code for this please?​
    13·1 answer
  • In 1981, the first digital icons were launched for users in _________, which was the first computer with a GUI operating system.
    12·1 answer
  • Does anyone know what i did wrong?
    13·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
    15·1 answer
  • Write a FOR loop that displays the following numbers exactly like this (you must use a loop):
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!