1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
9

Amber wants to give her audience copies of her presentation so they can follow along and take notes. What option should Amber ch

oose in the Print menu?
BTW this is a question about PowerPoint
Computers and Technology
2 answers:
blagie [28]3 years ago
6 0

Answer:

Print handouts

Explanation:

I had this question and even if you didn't put the answer options i knew what it was I hope this helped you out (:

Levart [38]3 years ago
3 0

Answer:

print handouts

Explanation:

its flvs right

You might be interested in
Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer.Assume th
Dafna1 [17]

Answer:

sendObject(John_Doe)

Explanation:

To invoke a method, simply call the name of the method, followed by it's arguments in parenthesis. i.e methodname(argument).

In this case, the name of the method is sendObject and it's argument is a Customer object stored in or referenced by a variable John_Doe.

The above is true since the method is defined in the same class that calls it. Otherwise, it is not valid.

6 0
3 years ago
How do I change my age on here?-<br> Why did it set it to 18???
zvonat [6]

Answer:

lol

Explanation:

go to edit profile

6 0
3 years ago
Read 2 more answers
Sensors send out ............ signals​
son4ous [18]

Answer:

mhmm................... ok

3 0
3 years ago
Which of the following would not count toward a weighted GPA?
marta [7]
D AP music theory is the answer
7 0
3 years ago
Read 2 more answers
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Other questions:
  • (tco 8) when a file is opened in the append mode, the file pointer is positioned
    8·1 answer
  • Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
    10·1 answer
  • When a vehicle strikes a pedestrian, it's most often during A. a period of darkness or low visibility B. the day when pedestrian
    10·2 answers
  • You are in charge of five software development projects. The project characteristics of each of the sys are as follows:
    13·1 answer
  • Can you make copies of classified documents provided you alert others?
    6·1 answer
  • Which tab should you choose to add a picture from a file to your presentation?
    8·1 answer
  • In an URL what does the domain name describe?
    14·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-
    7·1 answer
  • Python Coding:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!