1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
15

The {blank} view is the working window of a presentation.

Computers and Technology
2 answers:
oksian1 [2.3K]3 years ago
8 0

Answer:

C

Explanation:

Pls tell me if I’m wrong but I think its C

scoray [572]3 years ago
4 0

Answer:

A outline

Explanation:

You might be interested in
Which of the following correctly describes the Filter procedure for managing spreadsheet data? Check all that apply.
saveliy_v [14]

Answer:

Filtering procedure provides an essay and convenient way to visualize or work only with the data we desire without needing to delete those we do not need at that moment.

Filter allows you to view only the information you want to see. Only the required information is displayed at that moment once the filter criteria has been checked.

Filter temporarily hides rows of data that you do not need to view. Rows of data which aren't needed at the moment are temporarily hidden in other to allow user concentrate on the needed data.

Filter allows you to filter text and numeric data. Filtering allows for different filtering criteria, if the user requires working or viewing only on text or numeric data, it is possible with spreadsheet filter.

Explanation:

Filter allows you to view only the information you want to see.

Filter temporarily hides rows of data that you do not need to view

Filter allows you to filter text and numeric data.

5 0
3 years ago
Read 2 more answers
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
How impactful were shipping errors on customer questions.
Bumek [7]

Answer:

It's due to damage of goods

7 0
2 years ago
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
1 year ago
List four examples of soft and hard skills
emmainna [20.7K]

Answer:

Explanation:

soft skills

1 – Communication. ...

2 – Teamwork. ...

3 – Adaptability. ...

4 – Problem-Solving. ...

hard skills

Technical Skills

Computer Skills

Analytical Skills

Marketing Skills

8 0
3 years ago
Read 2 more answers
Other questions:
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • Quiz
    6·2 answers
  • A benefit of flashcards is that they are
    7·2 answers
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
    7·1 answer
  • If a student passes off an author’s work as his or her own, the student has
    6·1 answer
  • Explain how the CPU processes data instructions.
    6·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
  • Hannah is editing her brother’s birthday video. She has selected the usable shots and copied them onto her computer. What is the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!