1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
13

When presenting, which tool would you use to highlight and magnify a section of the slide?

Computers and Technology
2 answers:
marysya [2.9K]3 years ago
7 0
Well, the word magnify means to zoom, so I assume the correct answer is B. the zoom tool.
You would use this tool to zoom in your text which may be small, or to draw your audience's attention to specific details in your presentation. You would use the same tool to highlight a part of your slide.
V125BC [204]3 years ago
4 0
B.The zoom Tool

Hope this helps! :)
You might be interested in
What do you do when ur grounded from all electronics and can't go outside and have t clean all day
MAXImum [283]

Answer:

read, write, draw!

Explanation:

It would be fun!

6 0
3 years ago
A _____ is a way for students to keep track of information during research
malfutka [58]

Answer: Word

Explanation:  Word . Because in word we can writer the notes and where we can also search and get more information

6 0
4 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
What is the output of this line of code?
zzz [600]
The first one
“hello” + “goodbye”
6 0
3 years ago
Read 2 more answers
what is the least expensive way to connect five computers using a wired network to a router that has only four network ports?
ExtremeBDS [4]

Answer: Get wifi.

Explanation: Get wifi.

5 0
2 years ago
Other questions:
  • What is the correct posting of the journalized transaction shown in figure 3.03 to the accounts payable subsidiary ledger?
    9·1 answer
  • 4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
    5·2 answers
  • How many license plates are there if a license plate contains 3 letters from the 26 available in the English alphabet followed b
    15·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • Write a method that takes in a String and returns a new
    15·1 answer
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • …….. and ……...are called binary digits. (Computer Science)
    13·2 answers
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!