1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
5

When creating and modifying templates, which keys are used to add placeholders?

Computers and Technology
2 answers:
oee [108]3 years ago
6 0

Answer:

Insert Placeholder

Explanation:

beks73 [17]3 years ago
3 0

Answer:

On the Slide Master tab, click Insert Placeholder, and then click the type of placeholder that you want to add. Click a location on the slide layout, and then drag to draw the placeholder. You can add as many placeholders as you like. (For Power point) But not sure about a short cut for it. Hope this helps!

You might be interested in
The physical layer of the OSI model is not foundational to any of the other layers. True or False
galina1969 [7]

Answer:

False.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.

5 0
3 years ago
WILL GIVE BRAINLIEST!!! PLEASE HELP!!!
padilas [110]

Answer:

BOI I got ricked rolled!

Explanation:

He done it!

5 0
3 years ago
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
Which three of the following statements are true about using a WYSIWYG editor?
lubasha [3.4K]

Answer:

3

Explanation:

3 0
3 years ago
Read 2 more answers
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Using the bitwise AND operation, the result of 1 AND 0 is ___________. 10100100 ___________ 11010101 = 01110001. A common way to
    15·1 answer
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use t
    5·1 answer
  • Nascar has inserted an image into his document but needs the image to appear on its own line Which option should he choose?
    12·2 answers
  • Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of lines,
    13·1 answer
  • The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
    11·1 answer
  • What do “phone-copying” systems allow investigators to do?
    9·1 answer
  • Private notes about individual slides that you leave for yourself or for others who might use the presentation file is called __
    13·1 answer
  • You have purchased a new LED monitor for your computer. On the back of the monitor, you see the following port (pictured below).
    9·1 answer
  • Select 3 true statements about Python class.
    6·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!