1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
3 years ago
13

The space that helps you organize your PowerPoint or Web Page is called ______.

Computers and Technology
1 answer:
sergeinik [125]3 years ago
8 0

Answer:

the internet

Explanation:

cause I said

You might be interested in
Given an int variable k that has already been declared, use a while loop to print a single line consisting of 88 asterisks. Use
Grace [21]

Answer:

True

Explanation:

The while loop is going to be executed until the condition is false.

Since <em>k</em> is initially equal to 1, the loop will execute 88 times. One asterisk will be printed and <em>k</em> will be incremented by one during each iteration.

When <em>k</em> becomes 89, the condition will be false (89 is not smaller or equal to 88) and the loop will stop.

6 0
3 years ago
Will the fcc ruin the internet affect uk
n200080 [17]
No it will not the FCC is a federal owned company by the United States and has no control over any other servers outside of the US
3 0
3 years ago
there are 3 numbers X,Y,Z such that twice X is equal to therice Y and four times Y is equal to five times Z. the ratio between X
777dan777 [17]

Step-by-step explanation:

2x = 3y

4y = 5z

x = 3y/2

z = 4y/5

ratio between x and z is 15 : 8

3 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
Select the correct navigational path to create a combination chart. Select the chart. Click the Chart Tools tab. Select the data
nydimaria [60]

Answer:

format and design

Explanation:

8 0
3 years ago
Other questions:
  • Suppose alice, with a web-based e-mail account (such as hotmail or gmail), sends a message to bob, who accesses his mail from g
    10·1 answer
  • Assume the following JavaScript program was interpreted using staticscoping rules. What value of x is displayed in function sub1
    12·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • To quit Word, click the Restore button on the right side of the title bar. <br> True <br> False
    6·1 answer
  • Write a Java class to perform the following: 1. Write a method to search the following array using a linear search, ( target ele
    9·1 answer
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • Can someone please help me to point out what's wrong with this C program:
    13·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • The software concept ___________and defines a need for the new system.
    6·1 answer
  • 6
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!