Which print preview of your slide show includes a notes section for your audience?

Which Print Preview Of Your Slide Show Includes A Notes Section For Your Audience?

Answers

Answer 1

Answer:

I would say the one on the left side, have a good day! :)

Explanation:

I hope this helps! :)


Related Questions

Hardware failure, power outages, and DOS attacks will affect:

data confidentiality.

data integrity.

data verification.

data availability.

Answers

Answer:

The answer should be data availability

which of the following combinations of keys is used as a short for saving a document on a computer

Answers

ctrl+s  

is used to save

Hope this helped

-scav

20 POINTS-
can someone help with this?

Answers

Answer:

large storage= data warehouse

data from daily= world wide

data storaage= transactional

online data= relational

I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this

Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.

Answers

Answer:

. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.

Explanation:this is correct because got it right on the test.

Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools

Answers

Answer:

insert text box

Explanation:

Explanation:

format tab

Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.

Which of these devices features D-pads and analog sticks? ASAP PLEASE
A. smartphones
B. portable consoles
c. PDAS
D. feature phones
E. tablets

Answers

Answer:

b. portable consoles

Explanation:

hope that helps :)

Answer:

b - portable consoles

Explanation:

PLATO

can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points

Answers

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *

Answers

so the word your looking for is Properties so it would be

A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *

scav

Match the roles to the task they perform.

gather requirements
create software framework
identify errors in the software
develop program code for software

Role

software architects
business analysts
programmers
testers

Answers

Software Architects: “develop program code for software”

Business Analysts: “gather requirements”

Programmers: “create software framework”

Testers: “identify errors in the software”

why should information technology NOT be taught in school?​

Answers

Explanation:

Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.

Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​

Answers

Answer:

participle is singing

word it modifies is voice

Multitasking systems _____.

are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers

Answers

Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.

Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.

soak testing.
stress testing
load testing
spike testing

Answers

Answer:

load testing

Explanation:

to see if the activity can handle under performance

The introduction of the 8-bit computer expanded the number of bytes available for encoding. This led to the development of

Answers

It led to the development of octets.

Answer: It's D: Unicode on Edge

Explanation:

In the late ’80s, developers from Xerox and Apple worked on the explicit goal of unifying the various encoding systems into one universal character set. The result is Unicode, a character encoding system that can represent text written in all of the world’s languages and scripts. Unicode assigns a unique code point, an integer value denoted in base 16, to each character in the world’s languages. Applications such as web browsers or word processors “read” the Unicode, and then render the correct character according to the application’s own programming for font, size, and style.

Use the drop-down menus to match each description with the part of a report where it is located.

named moons in the solar system:
page number printed at the bottom of page 1:

page number printed at the bottom of page 20:

group of data titled “Hawks” in a report on species of migrating birds:

report titled “Technology in the Workplace”:

calculation printed beneath a group of data:

date of a report printed at the top of pages 2–100:

Answers

Answer:

1) Detail

2) Report footer

3) Page footer

4) Group Header

5) Report header

6) Group footer

7) Page header

Explanation:

I just did the assignment

Suppose cell C5 contains the formula =B$6+C1.


Match each formula with its respective cell if you copied it.


=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1


Thank you, have a great week.

Answers

Answer:

=A$6+B4 will be in B8

=B$6+C6 will be in C10

=C$6+D2 will be in D6

=D$6+E1 will be in E5

Explanation:

$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.

As formulars are copied, the references change respectively.

With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.

As we move left and right, the column alphabet will also experience change like the rows did.

Only the absolute reference won't change no matter the direction.

Hence,

=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8

=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10

=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6

=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5

Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the "edit distance" between the two strings as an integer. Edit distance (also called Levenshtein distance) is defined as the minimum number of "changes" required to get from s1 to s2 or vice versa. A "change" can be defined as a) inserting a character, b) deleting a character, or c) changing a character to a different character. Call Value Returned editDistance("driving", "diving") 1 editDistance("debate", "irate") 3 editDistance("football", "cookies") 6

Answers

Answer:

Explanation:

The following code takes in the two parameters s1 and s2 and returns the Levenshtein distance of the two strings passed.

def editDistance(s1, s2):

   m = len(s1) + 1

   n = len(s2) + 1

   arr = {}

   for x in range(m):

       arr[x, 0] = x

   for y in range(n):

       arr[0, y] = y

   for x in range(1, m):

       for y in range(1, n):

           proc = 0 if s1[x - 1] == s2[y - 1] else 1

           arr[x, y] = min(arr[x, y - 1] + 1, arr[x - 1, y] + 1, arr[x - 1, y - 1] + proc)

   return arr[x, y]

How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?

Answers

Answer:

here ya go

Explanation:

I would suggest either having a default difficult being easy, and if people want to be challenged they can increase it, or try to balance how much of the game requires strong twitch skills.

test unit 8 edhesive answers ​

Answers

What are the questions

PLEASE HELP ME ASAP I HAVE AN EXAM SOON!!!!

My ET-2600 printer isn't working. Black and white pages aren't printing, and if I try to print a BW page, it only print a blank sheet of paper.

How to fix?! I have checked the nozzle thingy on the app.

Answers

Answer:

try seeing if the nozzle of the cartridge is clogged

Explanation:

Hardware refers to programs and protocols used on a computer system.

True
False

Answers

Answer:

False

Explanation:

Answer:

false

Explanation:

i JUST took the quiz

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?

Answers

Answer:

Both animal and plant cells have mitochondria, but only plant cells have chloroplasts. ... Because animals get sugar from the food they eat, they do not need chloroplasts: just mitochondria.

Which game would be classified as an advergame?
A.
Tomb Raider
B.
Fifa Soccer
C.
Prince of Persia
D.
Flower

Answers

Answer:

B. Fifa Soccer

Explanation:

That should be your answer.

1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

B. a group or system of interconnected people or things

Which of these are characteristics of a Python data type? Check all that apply.

A Python data type is weakly typed.

A Python data type can have numeric values.

A Python data type can be shown by keys and values within brackets [ ].

A Python data type must be stated before it can be used in a program.

A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).

A Python data type can be a dictionary that can be updated, changed, or removed.

A Python data type cannot have connecting sets of characters separated by commas.

Answers

Answer:

A Python data type is weakly typed.A Python data type can have numeric values.A Python data type can be shown by keys and values within brackets [ ].A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ). A Python data type can be a dictionary that can be updated, changed, or removed.

Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available

Answers

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

Following is the matched solution for the given question.

I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.

I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.

II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.

III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.

IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.

V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.

Learn more about web-based software here:

brainly.com/question/4560046

#SPJ6

The students start the school year with the same number of crayons and markers in their supply boxes. They count the number of these supplies remaining at the end of the school year. Here is a bar chart showing the data the students collected. Predict the three colors of crayons and markers the class will use the most next year.

Answers

Answer:

Hello :P AAAAAAAAAAAAAAAAAAAAAAAAA

what is a flowchart and write it's work​

Answers

Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Explanation: brainliest plz!

Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations

Answers

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.

Other Questions
HELP ME DUE IN 2 HRS! Greg Biffle won the Samsung/Radio Shack 500 NASCAR race at the Texas Motor Speedway in April 2005. His average speed was 130 miles per hour. How many feet per second is this? Round to the nearest hundredth. What is quackery? Why is it sometimes difficult to identify health services that are based on pseudoscience? Formal language need not be "fancy." It is merely free of features like slang, idioms, and abbreviations. Which choice is fobecause it contains no idiomatic expressions?esA)The preps always sit over at that table.B)Samantha has an appointment early Monday morning.C)That was a real bogus tale Charlie told the teacher.D)I don't think Tim will be here today; he's playing hookie. Public goods can cause positive _______________.please help A pet store is having a pet fish sale. Mrs. Smith bought koi and paid with a $50 bill. Write an algebraic expression to represent how much change Mrs. Smith got back. Find the output y when the input x is -5y=? Which expression is equivalent to (q? 16)?M. (q - 4)2P. (9 + 4)(9-4)R. (q + 8)(9 - 2)S. (9-8)(9 + 2) please help solve for x step by step ASAP! Read the following passage:When they saw all this, my men begged me to let them first steal some cheeses, and make off with them to the ship; they would then return, drive down the lambs and kids, put them on board and sail away with them. It would have been indeed better if we had done so but I would not listen to them, for I wanted to see the owner himself, in the hope that he might give me a present.Based on this passage, what is the primary motivation for Ulysses actions?to gain wealthto gain prestigeto gain directionsto gain respect from his crew summarize the treaties that led to the end of the cold war PLEASE HELP !! ILL GIVE BRAINLIEST *EXTRA 40 POINTS* DONT SKIP :(( .! At a fixed pressure, if the temperature is doubled, the volume of a gas will be Which large planets are composed mostly of hydrogen and helium gases?rocky planetssteroidsgas giantsdwarf planets I need help im doing IXL right now (BB.3 Complete a function table: quadratic functions) i just need help with this final question (posted with a picture) Although a wasps' painful sting can ward off some predators, insects and animal's, ranging from beetles to blackbirds, still prey on the insect. Angelina is a nice girl, but she doesn't seem to catch on quickly. She doesn't have a great deal of common sense.What would the Spanish idiom to this be? GOD PLEASE HELP ME. i really do need help. Calculate the perimeter of this figure. Round your answer to 2 decimal places. Show all work andinclude proper units. DONT FORGET TO FIND MISSING SIDE 6 ft10 ft6 ft10 ftTEIS PM ANSWER THE QUESTION FOR BRAINLIESTANSWER THE QUESTION FOR BRAINLIEST 13. Why was the significance of the soviets that were set up all over Russia?