1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
14

How would you delete a slide from your presentation after selecting it?

Computers and Technology
1 answer:
wolverine [178]3 years ago
7 0
You right click on your mouse then a thingy majigy should come up then press delete slide ;)
You might be interested in
When patel’s advertising co. decided to upgrade its computer network, many people were involved in the decision. In b2b buying s
babunello [35]

In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

<h3>What is Business-to-Business service?</h3>

Business-to-business is known to be a kind of a scenario where one business is said to often makes a commercial transaction with another kind of business.

The B2B decision-making process is known to be made up of some discrete tasks such as:

  • Knowing that there is an issue or need.
  • Examining  and comparing the available alternative or solutions
  • Defining the requirements that is needed for the product and others.

Hence, In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

Learn more about b2b from

brainly.com/question/26506080

#SPJ1

4 0
2 years ago
Swapping two numbers
Tju [1.3M]

Answer:

Swapping two numbers means exchange the values of two variables with each other.

8 0
3 years ago
A person appreciation of a food taste and flavor is commonly referred to as what
Nimfa-mama [501]

Answer:

Palate - A person’s appreciation of taste and flavor, especially when sophisticated and discriminating Eclectic - Deriving ideas, style, or taste from a broad and diverse range of sources Piquancy - A pleasantly sharp and appetizing flavor

6 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
A researcher is interested in whether working memory is influenced by lack of sleep. The researcher administered a measure of wo
ale4655 [162]

Answer:

Dependent sample t-test

Explanation:

The Dependent sample t-test compares the mean score of measurements in one group to that of another other group. It mainly used when analyzing comparable sample units as it pairs repeatable observations within a time frame.

For example, a researcher administered a measure of working memory to a group of subjects at 8am on Day 1 of the study and then again at 8am on Day 2 of the study, after keeping the subjects awake the entire night.

5 0
3 years ago
Other questions:
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • Markup is best defined as
    11·1 answer
  • Given that two int variables, total and amount, have been declared, write a loop that reads integers into amount and adds all th
    11·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
    11·1 answer
  • Write a method that computes the sum of the digits in an integer. Use the following method header: public static int sumDigits(l
    5·1 answer
  • Choose and explain, step by step, one method of backing up student files either manually or using a cloud service.
    10·1 answer
  • To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2
    12·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Both IT professionals and governments must apply ethical principles to certify that emerging technologies are to society.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!