In PowerPoint online what can you add to your presentation from the insert tab
Animations
Designs
Pictures
Transitions

Answers

Answer 1

Answer:

pictures

Explanation:

if you have PowerPoint you can use it side by side

Answer 2
picturesssssssssssss

Related Questions

Queries in Access are utilized by users to enter data into tables and view existing records true false

Answers

Answer:

False.

Explanation:

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Database schema is the logical design of a database. In database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Datasheet View in Access are utilized by users to enter data into tables and view existing records.

What item appears in a user’s My Unresolved items after synchronization using Salesforce for Outlook? (2 answers)

Answers

The avialble options are:

1. Notes not associated to a record

2. Emails not associated to a record

3. Contacts not assigned to an account

4. Cases not assigned to a contact

Answer:

1. Contacts not assigned to an account

2. Emails not associated to a record

Explanation:

Given that any items that are not automatically assigned to Salesforce records are found in My Unresolved Items.

Hence, usually, Items such as Contacts, Events, Emails, and Tasks are found in a user's My Unresolved Items after synchronization using Salesforce for Outlook.

Thereby, in this case, the correct answers are:

1. Contacts not assigned to an account

2. Emails not associated with a record

Someone please help?!



Drag the tiles to the correct boxes to complete the pairs.
Match the soft skills with their descriptions.
to foster approachability among team members
to come up with creative but practical solutions
to set priorities and accomplish goals
to identify and effectively use a team's potential
to accomplish goals
leadership
analytical thinking
coordination
2
time management

Answers

Answer:

i think the 1st one is for leadership

Answer:

im taking it right now

Explanation:

funny

g How safe is to have a LinkedIn account where you have published all the important information about yourself

Answers

Answer:

LinkedIn is very safe

Explanation:

LinkedIn is very safe, that being said you should never post private information about yourself anywhere that you do not want others to see/know. LinkedIn is a job recruiting and networking site, meaning that all the information that you have or will be publishing there should be related to your career. There is no reason for you to publish private information such as document numbers, social security number, address, bank account info, etc.

Answer:

The concept you are looking for is "digital footprint" and it goes far beyond any one social network.

Any information that is public can be used against you. You have to make an assessment about the risk/reward of making data public, and once it is public, you have to treat anyone using that information as public, too. Too often people think that if someone knows something about them, then they can be trusted, an "insider".

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address

Answers

Answer:

Network Address Translation (NAT).

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6).

Network Address Translation (NAT) is a technology that provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address.

This ultimately implies that, Network Address Translation (NAT) is a technology used by network engineers to translate IP addresses into a single IP address on a local area network.

In which area is composing for games different from composing for movies?
A. looping scores
B. royalties earned
C, temp tracks
D. adaptive scores

Answers

Answer: royalties earned

Explanation:

In areas such as the looping scores, temp tracks and adaptive scores, there are similarities when composing for games and when composing for movies.

The area where there is difference when composing for games and composing for movies is the royalties earned. The interest that is earned on royalties for both cases are different.

How many questions have you seen so far other than this one?

Answers

Answer:

18 other questions were answered by myself and Aristotle

Answer:

id.k

Explanation:

thanks for the points

The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as

Answers

Answer:

Security code review.

Explanation:

The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as security code review.

The main purpose of security code review is to ensure that all the necessary security measures or procedures are adopted (available), to confirm the level of accuracy of its operations, and verify that all loopholes for unauthorized access or use by attackers is prevented.

Hence, various software developers employ the security code review process in order to ensure that the integrity and safety of their software applications or programs are present.

Code review is the process for auditing the source codes and is a an application that is used for verification of the proper security control that are present and that they are intended to use.

The code review is to assure the quality of the software and verity the activity that checks the program mainly for viewing the parts of code.

Learn more about the source code for an application to verify that the

brainly.com/question/24749514.

What name is given to the assurance that requested information is available to authorized users upon request

Answers

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

Answers

Explanation:

Operating system is a system software, whereas,  Kernel is a part of operating system. Operating system acts as an interface between user and hardware. Kernel acts as an interface between applications and hardware. In Linux, for example, device drivers are often part of a kernel (specifically Loadable Kernel Modules).

is a colon (:) and semicolon (;) important in CSS declaration?

Answers

Answer:

YES

Explanation:

this is very important

50 POINTS!!!!! WILL MARK BRAINLIEST!!!!!HURRY!!!!!
Your Python program has this code.

for n = 1 to 10:
position = position + 10 # Move the position 10 steps.
direction = direction + 90 # Change the direction by 90 degrees.

You decided to write your program in a block programming language.

What type of block do you need to accomplish what this line does?
direction = direction + 90 # Change the direction by 90 degrees.

A) event

B) voice and graphics

C) control

D) motion

Answers

Answer:

control

Explanation:

Repeat 10 times is a control block.

The type of block that would be needed to accomplish the line would be C. Control

What is Programming?

This refers to the set of code that is given to the computer by a programmer to execute a task.

Hence, we can see that from the line of code that shows a sequence of numbers from 1 to 10 and to move and change the direction of the position and degree, to write this program in a block programming language, the type of block that is needed is a control block.

Read more about block programming here:

https://brainly.com/question/14525641

#SPJ2

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services are running determine what exploits have been committed determine what systems are up and running

Answers

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

why should technology be used. No plagiarism pls.

Answers

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

i have an answer, but it won’t let me type it because it says incorrect answer which is ridiculous. here’s what i had, though

what is active transport​

Answers

Answer:

the movement of ions or molecules across a cell membrane into a region of higher concentration, assisted by enzymes and requiring energy.

Here ya go ;)

Write two lines of code to draw the following circles centered at 600,600. The radius of the smallest circle is 200. There are 50 points between the larger circle and the smaller circle.

Answers

Answer:

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

Explanation:

# include < conio.h>

# include < iostream.h>

int canvas.draw_circle,

namespace std

{

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

}

return,

What is the difference between MySQL and MariaDB?

Answers

Answer:

Explained below

Explanation:

They are both server database.

MySQL Server database has two licensing options namely GPLv2 and Enterprise. Whereas, MariaDB Server database is one that has only one license which it is licensed to namely GPLv2.

Now, the license for both of them differs in that the one for MySQL Server database comes with some available features and support. Whereas, the one for MariaDB comes with the full-featured package.

What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?

Answers

Answer:

The answer is "Army Portfolio Management System".

Explanation:

The Army Way to solve Information-Technology (APMS-AITR) portfolio management registration for IT investment, IT capacity, and IT software was its single legal army registry.

Its main goal of IM/IT Management Of working capital and Corporate Finance is to prioritize IM/IT expenditure by evaluating and handling TRADOC as just an investment portfolio. The APMS was its main decision supporting instrument for military portfolio management.

The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and workspace at the beginning of a script

Answers

Answer:

This is done for the simple reason of having more space to work on

Explanation:

This is done for the simple reason of having more space to work on. By clearing the command window and workspace you provide yourself with sufficient space to create new commands without the clutter of the previous commands. This also prevents your focus from shifting towards old commands and allows you to simply focus on the commands you are currently working on. This does not clear all variables from the script, it only clears the current screen but the previous commands can still be accessed by using the up-arrow key

Write a c program using loops to generate following output.

12 x 2 = 24
11 x 2 = 22
10 x 2 = 20
9 x 2 = 18
8 x 2 = 16
7 x 2 = 14
6 x 2 = 12
5 x 2 = 10
4 x 2 = 8
3 x 2 = 6
2 x 2 = 4
1 x 2 = 2

Answers

Answer:

#include <stdio.h>

int main()

{

for (int n = 12; n > 0; n--) {

 printf("%d x 2 = %d\n", n, n * 2);

}

}

Explanation:

Only one loop.

_______ workplace cultures emphasizes everyone being in agreement.

Answers

Answer:

Calm

Explanation:

_____ software enables team members to prioritize and track tasks by providing features such as boards, timelines, and calendars.

Answers

Answer:

task management

Explanation:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____. Group of answer choices

Answers

Complete Question:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____.

Group of answer choices.

A. OLE DB

B. ODBC

C. SQL Server

D. Access

Answer:

D. Access

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Some examples of data providers included with .NET for accessing and manipulating data in databases are;

A. OLE DB: this is an acronym for Object Linking and Embedding Database. OLE DB was designed and developed by Microsoft corporation and it comprises of various application programming interfaces (APIs) used for data access.

B. ODBC: it is an acronym for Open Database Connectivity and it was designed and developed by Microsoft corporation used for data access through structured query language (SQL).

C. SQL Server: it is a domain-specific language server designed and developed for managing the various data saved in a relational or structured database.

Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order functions to simplify the design.

Answers

Answer:import functools

# open your file

file = open("integers.txt", 'r')

file = file.read()

# put numbers into a list

file = file.split()

# convert list into integers

file = list(map(int, file))

# use lambda function to get average.

print(functools.reduce(lambda x, y: x+y / len(file), file, 0))

Explanation:

How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming:

Answers

Answer:

58.4 ms

Explanation:

How long does it take to send a 14 MiB file from Host A to Host B over a circuit-switched network, assuming:

Total link transmission rate = 31.1 Gbps.

Network is TDM, with 11 permitted users, each with an equal time slot size.

A link connection requires a setup time of 51.7 ms.

Solution:

For TDM transmission, the bandwidth is divided equally between the users for transmission.

Transmission rate of each user = 31.1 Gbps / 11 users = 2.83 Gbps = 2830 Mbps

Time taken for file transmission = file size / transmission rate = 19 Mb / 2830 Mbps  = 0.0067 seconds = 6.7 ms

Total time taken = Set up time + transmission time  = 51.7 ms + 6.7 ms = 58.4 ms

The total transmission time is 58.4 ms

When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated

Answers

Answer:

NO

Explanation:

No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system. However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original files

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with

Answers

Question:

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Answer:

Written in Python

listlent = int(input("Length of List: "))

mylist = []

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

evens = 0

odds = 0

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

       

if(evens == 0 and odds != 0):

    print("All Odds")

elif(evens != 0 and odds == 0):

    print("All Even")

else:

    print("Neither")

Explanation:

This prompts user for length of the list

listlent = int(input("Length of List: "))

This initializes an empty list

mylist = []

The following iteration reads the list items from the user

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

The next two lines initialize even and odd to 0, respectively

evens = 0

odds = 0

The following iteration if a list item is even or odd

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

This checks and prints if all list items is odd        

if(evens == 0 and odds != 0):

    print("All Odds")

This checks and prints if all list items is even        

elif(evens != 0 and odds == 0):

    print("All Even")

This checks and prints if all list items is neither even nor odd

else:

    print("Neither")

A medical record that contains computer-generated reports, collects data, and shares data with outside agencies is a

Answers

Answer:

Electronic Health Record

Explanation:

ELECTRONIC HEALTH RECORD is a medical record which helps to collect patients data pertaining the patients medical information and history such as the patient diagnosis, the treatment that was given to the patient and the medication given to the patient, by then sharing the collected and store medical data or information with external agencies in order to reduce any medical mistakes that may want to arise and to as well provide high quality health care service to the patient as regards to the patient already stored medical history on the ELECTRONIC HEALTH RECORD.

A company wants to build a new type of spaceship for transporting astronauts to the moon. What should the company do first?

Answers

Answer:

Think of some ideas of how their gonna create the new spaceship

Explanation:

Because I'm Smort (typo intended)

Answer: The steps: ask to identify the need and constraints, research the problem, imagine possible solutions, plan by selecting the most promising solution, create a prototype, test and evaluate the prototype, and improve and redesign as needed. Also called the engineering design process.

Explanation:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Answers

Answer:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Explanation:

You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt().  3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message.  If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

Other Questions
Define the term remote sensing, and explain whether GPS and GIS are considered examples of remote sensing, and why. (Think about ways in which satellite imagery can be used to track changes on Earth's surface.) How did the Abbasids govern and from where? 22 gallons of gas cost $65.56. What is the unit rate for 1 gallon of gas?Group of answer choices$298 per gallon$3.28 per gallon$3.08 per gallon$2.98 per gallon five and one ninth minus two and three fourths quick pls If you had to choose either Turkey or Saudi Arabia to live, which would you choose?Why? Write at least 3 complete sentences to explain. Read the speech and answer the question.Voluntourism: An Opportunity Too Good to be TrueA Speech to the Student Body of Evergreen High[1] Picture this: It's Spring Break, and you fly off to some country where there's lush rainforests and beautiful, blue coastlines to explore. There's also people in need, so you decide to blend your vacation with volunteering. Volunteering as a tourist, or voluntourism, seems like a great way to explore new regions and help people at the same time. However, this "volunteer plus travel" experience can actually harm local communities. While many teens might view traveling and volunteering abroad as a worthwhile adventure, there are more genuine and effective ways to make a difference.[2] Most would agree that volunteering in general is a worthy use of time. However, what if you found out the children you are "helping" are actually being kept in poor conditions so voluntourists will spend money to come to the local area? Dale Rolfe, a supporter of ethical voluntourism, explains the shocking reality that "Animal sanctuaries and orphanages are often manufactured for the voluntourist...encouraging a cycle of exploiting the very animals and children the volunteers are trying to help."[3] Proponents of the "volunteer plus travel" experience also argue that traveling to new places builds character and is a valuable way to learn about different cultures. With voluntourism, however, participants often pursue experiences that are all about them. For example, they sign up to build a school for a gold star on their resume, but they have no real building skills and take jobs away from local construction workers (Schulten). Or, they arrive to teach English but instead take selfies with the locals. One world traveler and ethical voluntourist believes voluntourism "can perpetuate small minded views of the world by taking insulated, fake, and structured experiences and selling them as unabridged and eye opening" (Carlos). The voluntour experience is a mirage. The voluntourist's eyes are not opened to real life at the destination, and lasting change is not achieved.[4] If you want a genuine experience where you can see a lasting impact, there are better options than voluntourism. You can volunteer in your local community. Give an hour every week to your town's animal rescue. Serve monthly dinners to the homeless. Be a reliable, positive influence on a child who needs a mentor. Studies show that volunteering and forming lasting relationships with those you help has a positive impact on your physical and emotional health. In fact, blood pressure is reduced, memory is improved, and rates of depression are reduced (Michaels).[5] There is another reason to look into alternatives to voluntourism. Did you know the average "voluntour" travel package costs $3,400 (Rolfe)? Could that travel money be better spent? If the world's citizens are your passion, it could go to an international organization. If you care about education, your funds can be used to buy books for students in faraway lands. If you want villagers to have clean water, contribute funds to local efforts to dig wells. If you want to experience a different culture, travel to the country as a guest, and learn from the locals how you can best help them after you've returned home. But do not voluntour.[6] In reality, there are better ways to make a difference. Voluntourism might appear to be an adventure that blends travel and helping others, but it does little except provide a costly, superficial experience that might actually do more harm than good. So, volunteer where you are most needed-at home, where you can stay to see the job through and form genuine, lasting relationships. Choose a beautiful coastline closer to home and send the travel money you saved to an international organization that will put it to good use. Whatever you do, don't turn someone else's hardship into your vacation.How does the speaker's metaphor of a gold star in paragraph 3 support the purpose of the speech?A) It challenges the audience to view voluntourism opportunities in a positive light.B) It confirms the idea that voluntourism experiences look good on a college or career resume.C) It emphasizes the selfish and superficial motivation behind voluntour opportunities. D) It highlights the generous contribution that voluntours make to the areas they visit. whats 8 squared + 15 squared = 17 squared Question 8 of 10Which of the following responses is the most ethical way to deal with aproblem?A. Hire a public relations firm to deal with the media fallout.B. Consider what effects your actions would have over the long termif they were discovered.C. Discover who was responsible and terminate their relationshipwith the company.D. Assume that the customer is always right. Write the following equation symbolically.The product of 7 and w is 8 times the sum of 2 and x. Which statements about drought are correct? Check all that apply.1. there is little or no rainfall over an extended period of time2. crop yields on farms are greatly reduced 3. drought can end with one major rainstorm4. only farm owners are seriously affected by drought 5. land is stripped of the vital nutrients needed to grow healthy plants Justify whether the equation y=9x4 defines a linear or nonlinear function. Anyone..Please help!!!!! PLEASE HELP ME!!!! In five to seven sentences describe and summarize the Medieval era of music. Pleas help dude or mama i also need to find the value of h that makes the equation true help please Here is today's homework assignment. what is the subject and verb of that sentence Jenny has one-liter containers, and each container is two-thirds full of sports drink. How much sports drink is in 5 of the containers? A. 52/3 liters B. 31/3 liters C. 22/3 liters D. 41/3 liters How many 1/3 cup serving are in 5/6 of a cup? Which row in the table is the right answer for the system of equation How & Why European Empires expanded into the Americas. Pay attention to theadvantages that Europeans had over Native Americans and their incentive.