1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
11

After inserting a video into your slide how can you test it

Computers and Technology
1 answer:
blagie [28]3 years ago
7 0

Explanation:

How to insert video into PowerPoint

  1. Click on the slide you want, then go to Menu > Insert.
  2. In the top right corner, click Video > Video on My PC.
  3. Find the video you want to add and click “Insert”.
  4. Adjust the settings in the Video Format toolbar to make sure it plays the way you want.
You might be interested in
Long form of EMF and examples ​
aliya0001 [1]

Answer:

EMF: Electro-Motive force, also called emf (denoted and measured in volts), is the voltage developed by any source of electrical energy such as a battery or dynamo. ... The potential difference of electrical energy is called electromotive force or emf.

Examples; electrochemical cells, thermoelectric devices, solar cells, electrical generators, transformers, etc.

5 0
3 years ago
program that reads numbers from scanf (keyboard) and then sums them, stopping when 0 has been entered. Construct three versions
Alex17521 [72]

Answer:

Explanation:

I'm going to write three examples in C language:

int main() {

   int n, i, sum = 0;

   printf("Enter the number: ");

   scanf("%d", &n);

   for (i = 1; i <= n; ++i) {

       sum += i;

   }

   printf("Sum = %d", sum);

   return 0;

}

int main() {

   int n, i, sum = 0;

   printf("Enter a number: ");

   scanf("%d", &n);

   i = 1;

   while (i <= n) {

       sum += i;

       ++i;

   }

   printf("Sum = %d", sum);

   return 0;

}

int main() {

   int n, i, sum = 0;

   do {

       printf("Enter a number: ");

       scanf("%d", &n);

   } while (n <= 0);

   for (i = 1; i <= n; ++i) {

       sum += i;

   }

   printf("Sum = %d", sum);

   return 0;

}

7 0
3 years ago
15. In cell D6, enter a formula to calculate the percentage of High Priority Customers Sales out of All Customers 2016 sales. (T
BigorU [14]
First, input at the end of column A (containing High Priority Customers Sales Out): =sum(A1:A20) This represents the sum of the values from cell A1 to cell A20. Then, to calculate the percentage of each cell in A, input the formula: =(A1/$A$21)*100 This formula will give you the percentage of A1, if you drag the box down to A20, you will have all the percentages of each sale from A1 to A20. Then, format the cell using the percentage number format with no decimal places. Select column D then right click, "format cells" and select number, adjust the number of decimal places. <span />
6 0
3 years ago
Difference between multidimensional arrays and an example​
weqwewe [10]

Answer:

The generic data structure of a n-dimensional array is a tensor.

An example with 3 dimension can be a cube that contains the following dimensions: users, items, time. That cube can represent the interactions of  users with verifiied pages of public interests (influencers or company/media pages) in time slots (e.g. weekly timeslots).

Explanation:

You can represent in a sparse 3-dimensional array (tensor) the combinations of which user interacted with wich item in a given timeslow.

5 0
3 years ago
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
Other questions:
  • Write a method called justFirstAndLast that takes a single String name and returns a new String that is only the first and last
    9·1 answer
  • A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
    15·1 answer
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • You have been asked to delete some data from medisoft but find that there is no delete button. what is another method you can us
    10·1 answer
  • Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn c
    5·1 answer
  • In case of rdt 3.0 Stop and Wait, suppose we send a packet of 1KB through 1 Gbps link and RTT=20 msec. Find the sender utilizati
    11·1 answer
  • Systena Solutions Inc. contracts Anenta Software Inc. to develop advanced anti-malware software. In order to serve its new custo
    13·1 answer
  • Which 4 frame types are found in Adobe InDesign? (Choose 4.)
    6·1 answer
  • Importance of type casting in programming ​
    5·1 answer
  • Please help me with these questions​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!