1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
2 years ago
7

Help? Can you explain what this mean?

Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
3 0

Death by PowerPoint simply refers to a phenomenon that's caused as a result of the poor use of a presentation software.

It should be noted that the phrase was coined by Angela Garber. It simply means when an individual uses the presentation software poorly.

The main contributors to death by PowerPoint include confusing graphics, slides that had too much text, etc. It's important to present one's work logically with good information.

Learn more about PowerPoint on:

brainly.com/question/25795152

You might be interested in
Which is the correct sequence of steps for opening a new document?
ollegr [7]
Basic steps start with opening the program, clicking on File, then clicking on New for a new document.

Most programs open a new blank document when you open he program.
6 0
2 years ago
Read 2 more answers
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
A function ________ contains the statements that make up the function.
mestny [16]

Answer:

A) definition

Explanation:

3 0
3 years ago
Lewis is using a stylus with his touch screen computer in order to draw a
Drupady [299]

Answer:

imput

Explanation:

4 0
2 years ago
What are the factors affecting the purchasing decision for dbms software?
djverab [1.8K]
T<span>he factors affecting the purchasing decision for dbms software are : 
</span><span>a) Cost
b) DBMS features and tools
c) Underlying model
d) Portability
e) DBMS hardware requirements</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a C program that reads a string containing text and nonnegative numbers from the user and prints out the numbers contained
    6·1 answer
  • In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
    7·1 answer
  • What is a unique text-based Internet address corresponding to a computer's unique numeric IP address called
    14·1 answer
  • What kind of app or technology would you like to create?  Why ? <br><br><br>​
    11·1 answer
  •  Which device containing sensors send signals to the computer whenever light changes are detected? 
    11·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
    9·1 answer
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • Please help with this coding question
    8·2 answers
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!