1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
12

Which company developed Power Point ?​

Computers and Technology
2 answers:
Vaselesa [24]3 years ago
8 0

Answer:

Microsoft

Explanation:

ANTONII [103]3 years ago
4 0
Forethought, Inc.

Explanation:


Microsoft PowerPoint, virtual presentation software developed by Robert Gaskins and Dennis Austin for the American computer software company Forethought, Inc. The program, initially named Presenter, was released for the Apple Macintosh in 1987.
You might be interested in
Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author
sleet_krkn [62]

Answer:

Its D

Explanation:

On edg

4 0
4 years ago
Read 2 more answers
Pleaseeee Help.
Elenna [48]

Answer:B

Explanation:

3 0
3 years ago
Read 2 more answers
What occurs when a system produces incorrect, inconsistent, or duplicate data?.
kozerog [31]

Answer: Data integrity issues

Explanation:

8 0
3 years ago
What is the best operating system choice for a computer that only manages data?
Vanyuwa [196]

Answer:

Any form of Linux

Explanation:

The Linux OS is SUPER customizable, and it can still do everything that Windows or Mac OS does. Great Question.

8 0
3 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    13·2 answers
  • Technology will not? A. change the way work is done B. process information faster C. slow the pace of work D. link companies and
    8·1 answer
  • The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
    7·1 answer
  • Type the correct answer in the box.
    15·1 answer
  • Let’s use that simple branch instruction to do the following: Load the two words declared in the data statement shown to the rig
    14·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • To defeat SQL injection attacks, a web application has implemented a filtering scheme at the client side: basically, on the page
    15·1 answer
  • Why does my Chromebook keep on turning my new tabs into clever tabs?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!