1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
11

Create a poem about MS powerpoint presentation

Computers and Technology
1 answer:
iren2701 [21]3 years ago
5 0
You could use poem generator online or see samples and change some words
You might be interested in
What is the instruction phase of the central processing unit​
belka [17]

Answer:

The instruction cycle (also known as the fetch–decode–execute cycle, or simply the fetch-execute cycle) is the cycle that the central processing unit (CPU) follows from boot-up until the computer has shut down in order to process instructions.

7 0
3 years ago
Grid computing is a type of computing in which:
fredd [130]

Answer:

b

Explanation:

A computing grid can be thought of as a distributed system with non-interactive workloads that involve many files.

7 0
3 years ago
______ is the code that a user writes in order to create a document to display on the web
icang [17]

HTML(Hyper Text Markup Language) is the code that a user writes in order to create a document to display on the web.

Explanation:

HTML is a markup language used to create hyper texts that are platform-independent. Mark up feature can be linked to other web pages, e-mail, multimedia, documents, databases etc.

Tags are used in to identify each section like head, body, title, paragraphs, tables, images etc.

5 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Help please<br> helpp im begging
NemiM [27]
I think That it is A
6 0
3 years ago
Other questions:
  • This question refers to a standard deck of playing cards. If you are unfamiliar with playing cards, there is an explanation in P
    10·2 answers
  • To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.
    8·1 answer
  • Which consumer document is most likely to help you if you have trouble figuring out how to operate a device
    6·1 answer
  • The _______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network ar
    9·1 answer
  • What formatting option is easiest to read when printed out
    12·1 answer
  • Select the correct answer from each drop-down menu. Which two factors do ergonomic principles consider a part of a job? Ergonomi
    10·1 answer
  • Short note about micro miniaturzation​
    6·2 answers
  • 1. What does the word “processing” in data pro- cessing mean?
    13·2 answers
  • What is the scope of each variable?
    11·2 answers
  • charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!