1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
9

The underlying color of a slide.

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
5 0
Background would be your answer :)
You might be interested in
An automated search feature used by search engines to find that match your search terms is called a spider or
9966 [12]

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


5 0
4 years ago
Read 2 more answers
To select both a field label and field value to move in a report design, after selecting the field label press the ____ key to s
marishachu [46]

Answer: Shift Key

Explanation: Field label is the components that used for the displaying of the  screen area and field values generate due to default. When these both are to be selected and moved in certain report design then the selection in made by first by selecting the field label and then alternately pressing the shift key to select the default field value. Thus, the field value and field label is moved into the report design.

8 0
3 years ago
What happens if part of an ftp message is not delivered to the destination?
Oliga [24]

The message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

<h3>What is FTP?</h3>

FTP is an abbreviation for file transfer protocol and it can be defined as a type of server that's designed and developed to store and provide files for download, as well as sharing between two or more users on an active computer network.

Generally, the message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

Read more on FTP here: brainly.com/question/20602197

#SPJ12

4 0
2 years ago
In this lab, you complete a prewritten Python program for a carpenter who creates personalized house signs. The program is suppo
ivolga24 [154]

Using the computer language in python to write a function code that personalized house signs

<h3>Writting the code in python:</h3>

<em>#Assign varibles</em>

<em>charge = 0.00</em>

<em>numChars = 8</em>

<em>color = "gold"</em>

<em>woodType = "oak"</em>

<em />

<em>#Checking for number of characters</em>

<em>if numChars > 5:</em>

<em>charge = 35 + (numChars-5)*4</em>

<em>elif numChars > 0:</em>

<em>charge = 35</em>

<em />

<em>#Checking wood type</em>

<em>if woodType == "oak":</em>

<em>charge += 20</em>

<em />

<em>#Checking for color</em>

<em>if color == "gold":</em>

<em>charge += 15</em>

<em />

<em>#Print output</em>

<em>print("The charge for this sign is $"+str(charge)+".")</em>

See more about python at brainly.com/question/13437928

#SPJ1

5 0
2 years ago
Why is Resnick skeptical of calling the young people of today ‘digital natives’? Do you agree? Explain.
Nezavi [6.7K]

For question one, Resnick skeptical of calling the young people of today 'digital natives' will have to be agree. For agreeable reasons is because people who are called "digital natives", is because they are in a technological state that they are familiar with. Which means that if young people are in a state of technology and they are really into it, you have this unbreakable string tied to the waist and it hangs into you from a tree.  And for reason two, is because coding can be helpful. In situations like people hacking you, with coding, now that is when it comes in.

And for the others, I'll have to look at some more information I might have. But, here is your first answer is up above, If it isn't good enough, then let me know.

Hope this helps.

~Karleif

3 0
4 years ago
Other questions:
  • What tool listed below will be the most useful for developing presentation content?
    12·1 answer
  • Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be sto
    5·1 answer
  • What is the name of a process thorough which several biometric readings are taken on an individual in order to create an accurat
    11·1 answer
  • When doing career research online, you always want to make sure you are viewing a reliable source, what factors about the websit
    10·2 answers
  • A Network Systems employee set up a network-wide password system in which other employees log in to access their work. Which tas
    6·2 answers
  • Problems of mobile phones
    8·1 answer
  • 5.14 Describe how the compare and swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting
    13·1 answer
  • Match each method of communication with its intended purpose.
    14·1 answer
  • What is computer science ​
    5·1 answer
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!