1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
8

if you want to prevent slides to fellow students or coworkers which productivity software would you should you use to create the

m
Computers and Technology
2 answers:
Vikki [24]3 years ago
7 0
One program used for presenting slides to people is Microsoft Powerpoint.
levacccp [35]3 years ago
4 0
Google slides, Powerpoint, you could even use photoshop if you really wanted to.
You might be interested in
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
puteri [66]

Answer:

Vulnerability scanner

5 0
3 years ago
If you want to use your computer for recording your band, you would benefit most from a(n)
notka56 [123]
A. MIDI interface.
RAID is a set of strategies for using more than one drive in a system.
3 0
3 years ago
Read 2 more answers
List 10 programs or applications on your computer other than any Microsoft office programs
Fofino [41]
Dropbox
Mozilla Firefox, Google Chrome
Gmail, Mozilla Thunderbird
CDburnerXP
Putty, Netflix,
Paint.net, Filezilla
3 0
3 years ago
6.8 Code Practice<br> please can have some help please
babymother [125]
Sure what is the question though
7 0
3 years ago
What are the Technical Skills do Penetration Testers need to have?
Alla [95]

1. Tester should understand the vulnerability of the system because by this skill it should be able to secure the system for the parts where the attacks can be done.

2. Understand the web technologies and communication techniques of them because the two way communication understanding is one of the most important skill a tester should have so that he/she should have a proper image of what the system doing and how it is doing it.

3. Ability yo code scripts and most importantly understand them because while testing there are many script code to be read and understand for any bug or error the system is facing.

5 0
3 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    6·1 answer
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • What type of accessory device can be used to measure AC current with a VOM without opening the circuit? A. Split inductor B. Amp
    13·1 answer
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • HURRY!!!!!!
    5·1 answer
  • Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
    8·2 answers
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    14·1 answer
  • Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assess
    5·1 answer
  • Which hardware component interprets and carries out the instructions contained in the software.
    12·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!