1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
14

celia was working on a presentation. because she chose the fly in animation for her slide title, she has to use the same animati

on for her bullet points. true or false
Computers and Technology
2 answers:
____ [38]3 years ago
7 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The answer to this question is True.

Because you can use the same animation on any content such as text, shape, images etc in PowerPoint.

As in this question, Celia was working on a presentation and she choose the fly in animation for her slide title. She has to use the same animation for her bullet points in the slide.

You can find the fly in animation in the Animation tab, under under Emphasis group of animation. You can apply the fly in animation  to any selected text, text block, shape, and or image. It is not necessarily, that one applied animation can't be applied again on the other content in the slide. However, it is noted that if you add the animation again on the content that already have the animation, then your previous animation effect will be replaced with the new one.

Neko [114]3 years ago
6 0

Answer:

false she can create custom animations for each part of the presentation

Explanation:

You might be interested in
What might be one reason why a stock becomes more valuable over time
Nikolay [14]
1. The General Market is Down This is for the most part the most evident reason that a stock is underestimated and happens when the large scale perspective of the economy is poor. It is helpful for financial specialists to have some fundamental apparatuses to esteem the general market so they can get ready as the market progresses toward becoming underestimated.
7 0
3 years ago
What network setting do i need for a workgroup?
juin [17]
Joining a workgroup requires setting up the PC with a workgroup name.
5 0
3 years ago
Most Microsoft Windows fatal errors (blue screen of death) are caused by:
rusak2 [61]

Answer:D) Hardware failure

Explanation: Fatal error are those which stops the function execution of the operating system during the run-time in the Microsoft Windows . These errors. These errors are seen the Microsoft windows due to the major reason of the hardware failure, accessing of the invalid code,operating system files might get corrupted etc. Therefore, the correct option is option(D).

7 0
3 years ago
About.com is considered a (an):
Andrei [34K]
About. com that changed its name recently to dotdash is basically a subject directory. It is a colection of blogs articles about various general intrests of writers. Most of the information it contains is not vetted and thus does not qualify as reference point.
7 0
3 years ago
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control
Nataly [62]

The subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

<h3>What is URL filtering?</h3>

The term URL filtering is known to function by looking at the similarities of all web traffic against a given URL filters.

Note that it is one that is made up of database of sites that users do access and as such, the subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

Learn more about subscription from

brainly.com/question/14073216

#SPJ1

4 0
2 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
    13·1 answer
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • Create a program in Python that prompts the user to enter an integer number within the range of 1 to 10 inclusive. The program s
    15·2 answers
  • A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
    8·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • Each of these is a step in cEach of these is a step in conflict resolution: Evaluate solutions suggested. Define the problem. De
    7·1 answer
  • 3.<br>Give two reasons why everyone should study technology<br>​
    10·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!