1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
14

How would you delete a slide from your presentation after selecting it?

Computers and Technology
1 answer:
wolverine [178]3 years ago
7 0
You right click on your mouse then a thingy majigy should come up then press delete slide ;)
You might be interested in
Find the number of times a value appears in a list, and create a new list that contains the index positions where the value occu
Maru [420]

Answer:

Program :

list_1=[]#take the empty list.

size=int(input("Enter the size of the list: "))#take the size of the list from the user

for x in range(size): #for loop which insert the elemnt on the list.

   list_1.append(int(input("Enter the "+str(x+1)+" element of the list: ")))#take the user input and insert the element.

element=int(input("Enter the element to be searched: "))#it take the elemnt to search.

loc=1#intialize the location value.

count=0

for x in list_1:#for loop to check the element.

   if(x==element): #check the element.

       print(loc,end=", ")#print the location of the element.

       count=count+1

   loc=loc+1

if(count==0):

   print("The element is not present on the list")#print when elemnt are not present.

Output:

  • If the user input 5 for the size and 1,2,3,4,5 for the list and 5 for the element, then it will print 5.

Explanation:

  • The above code is in python language which is used to take the size for the list, then take the value to add on the list.
  • Then the element is entered from the user to search on the list.
  • Then the element is searched on the list with the help of for loop.
  • It prints the location when the element is matched.

3 0
3 years ago
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
__________ is the backbone of a computer, connecting all of its components including the central processing unit (CPU) and prima
Tems11 [23]
It’s D. The microprocessor
5 0
3 years ago
You're researching information about titanium bike frames. Which Web site is probably the least biased? The web site of a nation
Alexxx [7]
The website of a National Bike Museum would give you information about all different kinds of bikes. 

A local Bike shop would likely be biased to try to get you to buy from them. 

Answer) The website of a National Bike Museum 
5 0
3 years ago
Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
hichkok12 [17]

A line of code that can be inserted directly into a .rmd file is called an inline code.

R Markdown (.rmd file) is a file format that is typically used for making dynamic documents by using R Studio and R programming language. Also, R Markdown files can be used in the following ways:

  • To save, organize, and document an executable code.
  • To create a record of any cleaning process.
  • To generate reports containing an executable code for stakeholders.

In R Studio, an inline code is a line of code that can be inserted directly into a R Markdown (.rmd file), in order to explain a process more clearly.

Read more on R Markdown here: brainly.com/question/25558534

8 0
3 years ago
Other questions:
  • The internet is a worldwide assembly of computer
    11·1 answer
  • All windows on the desktop have width and height (as well as numerous other attributes). However the actual contents of the wind
    13·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • A ________ refers to specific content of a field.
    7·1 answer
  • A computer ____ is the amount of data (typically measured in bits or bytes) that a cpu can manipulate at one time.
    8·1 answer
  • The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
    12·1 answer
  • The cardinality of the friend_of relationship set between two student entities in the student entity set should be:
    5·1 answer
  • 2x=y t-09 3xX=v 8x0=?+ 87-6x5=
    10·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!