1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
10

which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint

presentation
Computers and Technology
2 answers:
tangare [24]3 years ago
6 0

Answer:

Picture Effects gallery.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

To format an image on PowerPoint, you can either use the Artistic Effects or Picture Effects.

The Picture Effects gallery allows a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation.

<em>Basically, the Picture Effects consist of the following preconfigured formatting styles; transparent shadow, soft edge, reflection, glow, 3-D rotation, metal frame, bevels, perspectives etc. </em>

sp2606 [1]3 years ago
3 0

Answer: Picture Styles gallery

Explanation: He is correct he just typed it wrong.

You might be interested in
How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help
kompoz [17]

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

5 0
3 years ago
Listed below are several commonly used hardwoods and softwood
Elis [28]
Redwood
Red cedar
Bass wood
6 0
3 years ago
Crisp-DM is an open standard process model that contains stages
Feliz [49]

Answer:

Yes, Cross Industry Standard Process for Data Mining has six stages. Business understanding, data understanding, data preparation, modeling, evaluation, and deployment.

Explanation:

3 0
2 years ago
Read 2 more answers
The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest
kobusy [5.1K]

Answer:

Database

Explanation:

Database.

The State’s DNA database is a database of DNA profiles that can be made public or private and can be used in the analysis of genetic fingerprinting for criminology. There are certain laws that come with how DNA databases are supposed to be handled.

7 0
3 years ago
Forensic professional able modify and reconstruct images of a missing child, predicting the appearance even twenty years later?
Mama L [17]
The second option forinistic  animator
4 0
3 years ago
Other questions:
  • Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.
    10·1 answer
  • You have a new phone. What determines what type of messages you can send?
    15·1 answer
  • What is Administrator windows 10
    8·1 answer
  • A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simul
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly. Complete the sentence below that describes an open standard in vi
    7·1 answer
  • My feelings alwayss T-T
    14·2 answers
  • Write a C function named apply_all that expects two arrays of integers and their sizes and dynamically allocates a new array of
    7·1 answer
  • Dr. Thomas likes to follow up with her patients to make sure they were happy with their care. She sends all patients an email en
    14·2 answers
  • Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array
    14·1 answer
  • What can be used to help diagnose and fix computer hardware problems?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!