1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
12

Power point is hardware or software​

Computers and Technology
2 answers:
SashulF [63]3 years ago
7 0

Answer:

PowerPoint is the standard forms of software platform. It contains the CPU, memory, expansion slots and all the controllers required to control standard hardware devices.

Liono4ka [1.6K]3 years ago
6 0

Answer:

Software

Explanation:

because it's a computer software created by Microsoft which allows the user to create slides for the users.

You might be interested in
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the
neonofarm [45]

Answer:

Attenuation.

Explanation:

Attenuation means a gradual reduction in the strength of a signal as it moves from station to station which may even cause the receiving station to misinterpret the signal. Any signal can be attenuated - digital or analog.

Attenuation is often caused by weakness, fatigue or passiveness of networking cables and connectors. It could also be caused by noise and long distance.

To get around this, the network device(s) will often resend signals multiple times over just to ensure that at least one of the signals gets there and is interpreted correctly.

3 0
3 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
3 years ago
Given the following program: public class MysteryNumbers { public static void main(String[] args) { String one = "two"; String t
enyata [817]

Answer:

Check the explanation

Explanation:

/*Given the following program:

public class MysteryNumbers {

   public static void main(String[] args) {

       String one = "two";

       String two = "three";

       String three = "1";

       int number = 20;

​

       sentence(one, two, 3);

       sentence(two, three, 14);

       sentence(three, three, number + 1);

       sentence(three, two, 1);

       sentence("eight", three, number / 2);

   }

​

   public static void sentence(String three, String one, int number) {

       System.out.println(one + " times " + three + " = " + (number * 2));

   }

}*/

Write the output of each of the following calls.

sentence(one, two, 3);     three times two = 6

sentence(two, three, 14); 1 times three = 28

sentence(three, three, number + 1); 1 times 1 = 42

sentence(three, two, 1);   three times 1 = 2

sentence("eight", three, number / 2); 1 times eight = 20

7 0
3 years ago
A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remot
Yuri [45]

Answer:

Option 4 i.e., RDP, port 3389.

Explanation:

The User has informed the helpdesk with such an issue that involves the specialist to link to the remote server utilizing Remote Assist to access the user's screen with a quite informative and ambiguous error. Every attempt made by the technician to link to the virtual server outcomes in a message saying that the link has been denied.

So the combinations of RDP and port 3389 would be enabled on the remote computer’s firewall to allow this connection.

6 0
3 years ago
Mac os is based on the ____ operating system.
ankoles [38]
Mac os is based on the UNIX operating system.
4 0
3 years ago
Other questions:
  • Which is the best description of a hierarchical report?
    13·1 answer
  • How to turn a flash drive into a bluetooth adapter?
    13·1 answer
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
    15·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • Which of the following statements best illustrates how value was created for eggs? when a farmer sells a chicken who is no longe
    9·1 answer
  • SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!