1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
10

How can presentation software be used in a

Computers and Technology
2 answers:
atroni [7]3 years ago
7 0

Answer:

to compose letters and memos

to create charts and graphs from a table of

values

to deliver a sales presentation to clients

Explanation:

I forget what the reasoning behind them but I know this is the answer

sveticcg [70]3 years ago
6 0

Answer:

To automate the ticket purchasing process at the movie theaters through a kiosk

To teach lessons to high school students

To deliver a sales presentation to clients

Explanation:

I just used the answers above and got 2/3 wrong and edge said so

You might be interested in
What are the specifications for a mine shaft headgear ​
Licemer1 [7]

Answer: THERE ARE LOTS BUT I ONLY KNOW THIS

Explanation:

the depth of the shaft,

the carrying load of the skip and the mass of the counterweight,

the approximate size of the winding drum,

the approximate height of the headgear and the sheave wheel

4 0
3 years ago
Question # 1
Karo-lina-s [1.5K]

Answer:dataset

Explanation:

data set because it is kida a set

7 0
3 years ago
Read 2 more answers
I re-made the human version of Daddy Dearest from Friday Night Funkin
schepotkina [342]
I like the second one better xx
6 0
3 years ago
Read 2 more answers
A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the developm
andreyandreev [35.5K]

Answer:

SECURITY ANALYSTS

Explanation:

Security Analysts is a specialised security

administrator which is responsible for maintaining the security and integrity of data and performing system development life cycle activities in the development of a security system. The security analyst must have knowledge of every aspect of information security within the organisation and must analyze the security measures of the company and determine how effective they are.

The specialized security Administrator will be responsible for keeping data safe across the organization by monitoring, reporting, and addressing them and he must takes measures to protect a company's sensitive information.

5 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Proxy data:
    12·1 answer
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • What is the specifications, number of sales, positive and negative points and a few popular games of the first PlayStation?
    13·1 answer
  • If you do not want to keep a change made by the autocorrect feature, you can click the ____ button on the auto correction option
    12·1 answer
  • You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the serve
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!