Select all that apply. How do you save presentations?

Select the Save option in the Tools menu.
Click in the Task Pane.
Name them so you can find them later.
Click on an icon.
Select the Save option in the File menu.

Answers

Answer 1

Answer:

it's number 3 if I remember for Microsoft Excel

Explanation:

click “File” from the menu in the top left-hand corner of Excel. Then click “Save As


Related Questions

ANSWER 500 WORDS OR MORE

Talk about the two new EC platforms "Crowdsourcing" and "Augmented Reality."

Answers

Crowdsourcing is a new EC platform that leverages the collective intelligence and participation of a large group of individuals to accomplish tasks or solve problems. Augmented Reality (AR) is a new EC platform that overlays virtual information and digital content onto the real-world environment, enhancing the user's perception and interaction with their surroundings.

What is crowdsourcing?  What is augmented reality?

Crowdsourcing refers to the process of outsourcing tasks or obtaining information by soliciting contributions from a large group of people, typically through an online platform.

Crowdsourcing has emerged as a powerful tool in the realm of electronic commerce (EC). It allows organizations to tap into the skills, knowledge, and creativity of a diverse crowd, which can lead to cost savings, increased efficiency, and innovative solutions. By distributing tasks or problems to a wide network of individuals, crowdsourcing enables the completion of complex projects that may be time-consuming or resource-intensive for a single entity.

Crowdsourcing can take various forms, such as idea generation, data collection, problem-solving, and even funding. For example, companies can crowdsource ideas for new product development, inviting consumers to share their suggestions and preferences. Similarly, organizations can utilize crowdsourcing for market research, gathering data from a large sample of participants to gain insights into consumer behavior or preferences.

Augmented Reality (AR) is a technology that superimposes computer-generated information, such as images, videos, or 3D models, onto the real-world environment, thereby enhancing the user's perception and understanding of their surroundings.

AR has gained significant attention and adoption across various industries, including e-commerce. By blending virtual elements with the physical world, AR provides immersive experiences and valuable information to users. For instance, in the context of online shopping, AR allows customers to visualize products in their own space before making a purchase. They can virtually place furniture in their living room, try on virtual clothes, or even see how a new car model would look in their driveway.

AR also facilitates interactive product demonstrations and instructions. Users can access additional information, videos, or animations by simply pointing their mobile device at a specific object or image. This technology has the potential to enhance user engagement, increase sales, and reduce product return rates.

Learn more about   participation

brainly.com/question/4377998

#SPJ11

Strings need to be placed in

Answers

Answer:

glue

Explanation:

Which of the following is a network vulnerability scanner? (Choose two.) A) Nessus B) Keylogger C) Nbtstat D) Nmap E) pathping

Answers

The network vulnerability scanners among the given options are Nessus and Nmap.

How are Nessus and Nmap categorized as network vulnerability scanners?

Nessus and Nmap are both widely recognized network vulnerability scanners that help organizations identify and address security vulnerabilities within their computer networks. Nessus is a powerful and comprehensive vulnerability scanning tool that scans networks, systems, and applications for known vulnerabilities. It provides detailed reports and recommendations to help prioritize and mitigate potential risks.

Nmap, on the other hand, is a versatile network exploration and auditing tool that can also be used for vulnerability scanning. It helps discover hosts, services, and open ports, allowing security professionals to identify potential entry points for attacks. Both Nessus and Nmap play crucial roles in ensuring the security of networks by enabling proactive vulnerability management and risk reduction.

Learn more about Nessus and Nmap

brainly.com/question/32150075

#SPJ11

When would it be beneficial to make a copy of a document

Answers

Answer:

When you need to keep the original document or send the document to multiple people.

Explanation:

If you need to keep the original document (eg. marriage documents or birth certificate or something important), you would make a copy of it (unless you are sending it to a lawyer or a government agency).

If you, for instance, have a memo for your company that all your employees need to read, you would copy the document so you would be able to print it and send it to everyone without passing the document one at a time.

if the config tab and cli tab are both locked, what device do you need to use to configure the switch?

Answers

If both the config tab and CLI tab are locked, you would need to use a console cable and terminal emulation software** to configure the switch. A console cable is a specialized cable that connects the switch's console port to the serial or USB port of a computer. Terminal emulation software, such as PuTTY or SecureCRT, allows you to establish a serial connection with the switch and access its command-line interface (CLI).

By connecting the console cable and launching the terminal emulation software, you can establish a direct serial connection to the switch. This bypasses any restrictions on the config tab or CLI tab within the switch's graphical user interface (GUI).

Once connected, you can interact with the switch through the CLI, which provides a command-based interface for configuring various settings, managing ports, and implementing security measures. Through the CLI, you can execute commands to modify the switch's configuration and perform administrative tasks.

Using the console cable and terminal emulation software ensures that you have an alternative method of accessing and configuring the switch, even if the GUI-based configuration options are locked or unavailable.

To know more about graphical user interface, visit

https://brainly.com/question/14758410

#SPJ11

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

Answers

Answer:

That's brainly's way of making sure you're not a bot

Explanation:

I don't actually know

Answer:

did you download any file from this user or this similar link look at the picture below. If you please take it to someone who know how to get rid of viruses

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

2. Using the hash function described in Section 8. 2. 1, find the encrypted forms of the following passwords: a. Fido 6. B. Blank c. Ti34pper

Answers

Since the hash function described in Section 8.2. 1 is not given, a general description will be made:

Below is an example of how you can hash the passwords "fido", "blank", and "ti34pper" using MD5 in Python:

python

import hashlib

# Define the passwords

passwords = ["fido", "blank", "ti34pper"]

# Loop through the passwords and hash them using MD5

for password in passwords:

 # Create an MD5 hash object

  md5_hash = hashlib.md5()

  # Hash the password

 md5_hash.update(password.encode('utf-8'))

  # Get the hexadecimal representation of the hash

 hash_hex = md5_hash.hexdigest()

  # Print the password and its hash

  print("Password: ", password)

  print("Hash: ", hash_hex)

  print("--------------------------")

Please note that MD5 is considered a weak hash function for password hashing due to its vulnerability to collisions and other security concerns, and it is not recommended for use in modern security practices.

Therefore, The output will show the hashed forms of the passwords using the MD5 hash function. Again, please note that MD5 is not recommended for secure password hashing in modern security practices, and it's important to use stronger and more secure hashing algorithms, such as bcrypt, scrypt, or Argon2, for password storage to ensure better security.

Read more about hash function here:

brainly.com/question/13164741

#SPJ4

Computers convert data into information using the information processing cycle. (1 point) True False

Answers

Answer:False not true i tell you why rq i got to do something ill type why in c  hat but it is False

Explanation:

Computers convert data into information using the information processing cycle is a true statement.

What is the information processing cycle?

The information processing cycle is known to be the method, way or  sequence of workings that are found in the way information is been processed.

Conclusively, A computer is a device that is known to change raw data into information through the four steps of the IPC namely:

InputProcessingStorage Output

Learn more about data from

https://brainly.com/question/26711803

which of the following is a consideration when migrating to the cloud (check all that apply)? group of answer choices performance migration order resources licensing

Answers

Performance migration is the process of moving an application or workload from one environment to another to improve its performance. It involves analyzing performance metrics, identifying bottlenecks, and optimizing resources to enhance overall system performance.

When migrating to the cloud, there are several considerations that need to be taken into account to ensure a smooth transition. Performance is one such consideration, as it is important to ensure that the cloud infrastructure can support the necessary workload and provide efficient processing power.

Migration order is also a key consideration, as the migration process should be carefully planned and executed to minimize disruption to the business and ensure that critical systems are migrated first. Resources are another important consideration, as the cloud infrastructure should have sufficient capacity and scalability to meet the needs of the business.

Licensing is also an important consideration, as the cloud provider's licensing model may differ from that of the on-premise environment and require careful management. Overall, careful consideration of these factors can help ensure a successful and effective migration to the cloud.

To know more about Performance migration visit:

https://brainly.com/question/31791557

#SPJ11

question 4 the memory palace technique is useful for helping you to move information into your long-term memory. which of these statements about the technique are true?

Answers

The Memory Palace technique can be useful for enhancing long-term memory retention.Creating vivid and imaginative mental images is key to the effectiveness of this technique.

The Memory Palace technique, also known as the Method of Loci, is a mnemonic strategy that involves associating information with specific locations or rooms in a familiar physical space. By mentally navigating through this space and visualizing the information within each location, the brain creates strong associations between the information and the spatial cues.

This technique takes advantage of the brain's natural ability to remember spatial and visual information.  When you later need to recall the information, you can mentally retrace your steps through the memory palace, accessing the associated details.

The technique particularly useful for memorizing lists, sequences, or complex information that lacks inherent structure. By leveraging the power of visualization and spatial memory, the Memory Palace technique can significantly improve long-term memory retention.

learn more about Method of Loci here

brainly.com/question/30401765

#SPJ11

What type of business document is used to
communicate inside the company?

Answers

Answer:

Where’s your answer choices

Explanation:

Put it in the comments and I’ll do the same

State whether the given statement is True/False. Arguments are the input values to functions upon which calculations are performed.

Answers

false i think just saying

what function does a driver perform on the computer

Answers

Answer:

A driver, or device driver, is a set of files that tells a piece of hardware how to function by communicating with a computer's operating system. All pieces of hardware require a driver, from your internal computer components, such as your graphics card, to your external peripherals, like a printer.

Explanation:

Operating systems as well as other computer applications can access hardware features with the help of drivers, which provide a software interface between hardware devices. This eliminates the need for users to be aware of the exact specifications of the hardware being utilised.

What is the purpose of a device driver?

A device driver is a piece of specialized software that manages a specific computer-connected device; by providing a software interface to the hardware, it enables operating systems and other computer programs to access hardware functionalities.

How does a device driver work? Can you list all of its operations?

The operating system and its running programs send requests for device access and actions to the corresponding hardware devices through device drivers. In addition, they transmit messages or status information from the hardware to the operating system, which in turn transmits it to the apps.

Get More about drivers Visit:

https://brainly.com/question/14308161

#SPJ4

What can happen if you do not follow the directions when cooking or baking? (Give 4 examples in a sentence each)

Answers

Answer: 1: You will make it incorrectaly 2: It will taste terrible 3: You may break appliences 4: you may burn down your house.

Explanation:

Gemima has converted her table to a clustered column
chart. She now wants to add a title.
What should Gemima do first?
Select the table.
What should Gemima do next?
What should Gemima do last?
Use Ctrl+A
Use Ctrl+C
Use Ctrl+V.

Answers

Answer:

1. Select the table

2. use Ctrl A

3. type the title

Answer: select the table,Crtl+a,Type the title

Explanation:

Gemima has converted her table to a clustered columnchart. She now wants to add a title.What should Gemima

Under the Home tab, controls for aligning text and objects can be found in the
Clipboard group.
Font group
Paragraph group.
Editing group.

Answers

i believe the answer is editing group

Answer:

Paragraph Group

Explanation:

Identify the tool in OpenOffice writer which will help us to obtain special text effects.
Gallery
Clip Art
Fontwork Gallery
None of the above

Answers

Answer:

Fontwork Gallery

Explanation:

The "Fontwork Gallery" helps create special effects for your text, so it can speak volumes. It allows you to select any Fontwork style and become creative with it by filling it with different colors. You may also change the font's line color and width. You may also wrap it to the right, wrap it through and so on. It gives you enough freedom to make your font stand out and add color and style to any document you're working on.

You have created a Web page in HTML. When it fails W3C validation, you try changing the HTML standard to make your code more compliant. But the page fails W3C validation tests each time, regardless of standard. Which element that you used to structure the page is failing to validate

Answers

Answer:

<table>

Explanation:

W3C validation is a test applied to web pages codes, containing HTML, CSS and other important web frameworks, to make sure that they follow the right syntax and semantics prescribed by the W3C - World Wide Web Consortium.

When a web page, or simple an HTML document, passes this test then it shows that the set rules for creating web pages, that can be easily rendered across many browsers, have been well followed.

There are many reasons why the test may fail. Some of them are highlighted as follows;

i. Not specifying the Doctype at all. For an HTML document to pass the W3C validation test, it is important to specify the Doctype which tells the browser how to treat the document. If HTML is specified as Doctype, then the browser treats the document as HTML. If none is specified, the browser does not know and may have to guess how to treat the document.

ii. Missing closing tags. HTML is a markup language and the use of tags are very important. Many tags have opening and closing parts such as;

<p> </p>.

Some are self closing such as;

<br />

Now, opening a tag and not closing it will make the test fail.

iii. Not completing important child tags. Some tags have child tags that are very important. Child tags are put inside another tag called the parent tag. An example is the <table> tag which has a few child tags such as <tr>, <tbody> e.t.c

Now, when creating a table, according to the W3C specifications, one or more of the <tr> or <tbody> child tag should be inserted.

First time using this site so be mindful if I make any mistakes
For Micro Econ AP I am having a problem with this one question
It goes:
In what ways do households dispose of their income? How is it possible for a family's persoal consumption expenditures to exceed its after-tax income?

Answers

Answer:

Okay... Well

I will. help you out dear

What does the term Gestalt mean? A. image B. graph C. big D. part E. whole

Answers

Answer:

Part E

Explanation:

an organized whole that is perceived as more than the sum of its parts.

Answer:

E. whole

Explanation:

i got it right

Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart

Answers

Answer:

Column Chart

Explanation:

Choose the word that matches each definition.
a company that provides Internet access to customers for a fee
a protocol (a set of rules) for how web content should be sent and received by a web browser
✓the address of a webpage or website, such as www.microsoft.com/homepage.htm
the options are in the pic

 Choose the word that matches each definition.a company that provides Internet access to customers for

Answers

The definitions are ISP, HTTP and URL

How to define the words

Here are the word matches for each definition:

A company that provides Internet access to customers for a fee: Internet Service Provider (ISP)

A protocol (a set of rules) for how web content should be sent and received by a web browser: Hypertext Transfer Protocol (HTTP)

The address of a webpage or website, such as www.micro.soft.com/homepage.htm: Uniform Resource Locator (URL)

Read more on webpage here:https://brainly.com/question/13171394

#SPJ1

Convert (204) )
10

to base 2 . b) Convert (11101)
2

to base 10 . c) Convert (2AC)
16

to base 10 . d) Convert (10,000)
10

to base 2 e) Convert (8091) 10 to base 2.

Answers

a) (204) base 10 is equal to (11001100) base 2.

b) (11101) base 2 is equal to (29) base 10.

c) (2AC) base 16 is equal to (684) base 10.

d) (10,000) base 10 is equal to (10011100010000) base 2.

e) (8091) base 10 is equal to (1111110001011) base 2.

a) To convert (204) base 10 to base 2, we divide the number repeatedly by 2 and note down the remainders. Starting with 204, we divide it by 2, which gives us a quotient of 102 and a remainder of 0. We repeat this process until the quotient becomes 0. The remainders, read in reverse order, give us the base 2 representation: (11001100).

b) To convert (11101) base 2 to base 10, we multiply each digit by the corresponding power of 2 and sum the results. Starting from the rightmost digit, the powers of 2 are \(2^0, 2^1, 2^2, 2^3, and 2^4.\)Multiplying each digit by its respective power and summing the results gives us (29) base 10.

c) To convert (2AC) base 16 to base 10, we multiply each digit by the corresponding power of 16 and sum the results. Starting from the rightmost digit, the powers of 16 are \(16^0, 16^1, and 16^2\). Multiplying each digit by its respective power and summing the results gives us (684) base 10.

d) To convert (10,000) base 10 to base 2, we repeatedly divide the number by 2 and note down the remainders. Starting with 10,000, we divide it by 2 repeatedly until the quotient becomes 0. The remainders, read in reverse order, give us the base 2 representation: (10011100010000).

e) To convert (8091) base 10 to base 2, we follow the same process as in the previous examples. Dividing 8,091 by 2 repeatedly gives us the base 2 representation: (1111110001011).

Learn more about base here:

https://brainly.com/question/32891526

#SPJ11

Name a software program?​

Answers

Answer:

mathematica ,is a software program helps to solve maths equation ...

Explanation:

mark me as brainliest ❤️

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).
Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions. Conclude the main reasons why the attack on Target occurred.
Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly.
Justify your response

Answers

The fundamental challenges organizations face in protecting assets and information include cybersecurity threats, complexity of technology, insider threats, compliance and regulations.

What were the fundamental challenges that organizations face in protecting organizational assets?

Protecting organizational assets and information poses several fundamental challenges for organizations. These challenges include:

Cybersecurity threats: Organizations face evolving and sophisticated cyber threats that target their sensitive data and systems.Complexity of technology: The complexity of modern technology environments increases the potential attack surface and introduces vulnerabilities.Insider threats: Internal employees or trusted individuals may pose risks through intentional or unintentional actions.Compliance and regulations: Organizations must navigate complex regulatory requirements to ensure legal and ethical handling of data.Resource constraints: Limited budgets and resources may hinder the implementation of robust security measures.

Learn more about fundamental challenges

brainly.com/question/16338540

#SPJ11

one of the first computer aided design programs ever developed was also among the first to be integrated into erp systems. this popular program is

Answers

One of the first computer aided design (CAD) programs ever developed was also among the first to be integrated into Enterprise Resource Planning (ERP) systems.

This popular program is AutoCAD. AutoCAD was introduced in 1982 by Autodesk and quickly became a widely used CAD software in various industries such as architecture, engineering, and manufacturing. Its integration into ERP systems allowed for seamless data exchange between CAD and other business functions like inventory management, purchasing, and production planning.

AutoCAD's user-friendly interface, extensive features, and compatibility with different file formats contributed to its popularity and widespread adoption in the design and manufacturing industries. Today, AutoCAD continues to be a leading CAD software, providing designers and engineers with powerful tools for creating and documenting 2D and 3D designs.

To know more about AutoCAD visit:

https://brainly.com/question/30242226

#SPJ11

Where does most of the work in creating a presentation take place?

Formatting toolbar
Normal (Slide) view
Slide Sorter
Task pane

Answers

Answer: Normal (Slide) view

Answer:

Normal Slide View

Explanation:

Complete each sentence by choosing the correct answer from the drop-down menus.

The
printer works by spraying ink onto paper.


use a laser beam and static electricity to transfer words and images to paper.


are primarily business printers because they produce high-quality printed material and are expensive to purchase.

Laser printers use a special powdered ink called
.

Answers

Answer:

the printer works by spraying ink onto paper. Ink-Jet printers

use a laser beam and static electricity to transfer words and images to paper.  Laser printers

are primarily business printers because they produce high-quality printed material and are expensive to purchase. Laser Printers

Laser printers use a special powdered ink called toner

Answer:

✔ inkjet

✔ Laser printers

✔ Laser printers

✔ toner

Explanation:

write a program to output a big A like the one below

write a program to output a big A like the one below

Answers

hope this helps, i'm a beginner so this might not be the most concise method

write a program to output a big A like the one below
Other Questions
Problem 2-21 (Algo) Plantwide Versus Multiple Predetermined Overhead Rates [LO2-1, LO2-2] Mason Company has two manufacturing departments-Machining Assembly. The company considers all of its manufacturing overhead costs to be fixed costs. It provided the following estimates at the beginning of the year as well as the following information with respect to Jobs A and B: Required: 1. If Mason Company uses a plantwide predetermined overhead rate with direct labor-hours as the allocation base, how much manufacturing overhead cost would be applied to Job A? Job B? 2. Assume that Mason Company uses departmental predetermined overhead rates. The Machining Department is allocated based on machine-hours and the Assembly Department is allocated based on direct labor-hours. How much manufacturing overhead cost would be applied to Job A? Job B? (For Requirement 2, round your intermediate calculations and final answers to 2 decimal places.) What is the volume of a sphere with a radius of 18 units? A. 77767 units B. 1296 units C. 5832 units D. 1944 unitsIt's C High altitudes may produce hypoxemia by:a. right-to-left shunts.b. hypoventilation.c. decreased oxygen inspiration.d. diffusion abnormalities.e. All of the above are correct. Caroline is tiling her bathroom floor. each tile is a square, with 25cm sides. The bathroom floor is in the same of rectangle,4.5m by 2m.Usual price $15 per pack.Buy more than 10 packs and get 20 percent off the total price. a) How many packs of tiles does Caroline need? b) What is the total amount that Caroline pays for the tiles? Describe one way how plants respond to stimuli. Which number is NOT a commonof the fractions beingdenominatoradded?2/9 + 5/12A 108(B) 72(C) 36(D) 24 Help how do you solve this Fixed/single period inventory systems Assume Bigfoot company has an EOQ of 253 cases for their product. It typically takes a lead time of 4 weeks to receive the product after it is ordered. The average demand per week, in cases is 1,000 cases. Assume that the cost to place an order is 20 USD. What is the average demand during the lead time? RecommendationsSkiSixth grade> FF.1 Perimeter SEMWhat is the perimeter?57 km7 km8 kmkilometersSubmitN.Perimeter of polygons Note that common contexts are listed toward the top, and less common contexts are listed toward the bottom. according to o*net, what are some common work contexts for financial analysts? check all that apply. indoors, environmentally controlled face-to-face discussions electronic mail extremely bright lighting cramped work space spend time bending or twisting the body Let f be the function defined byf(x) = 3^x. If three subintervals of equallength are used, what is the value of the left Riemann sum approximation for3.523 dx? Round to the nearestthousandth if necessary. Place where population is high,people cannot get chance for employment. The most common isotope of gold has atomic number 79 and atomic mass number 197. How many protons and neutrons does the gold nucleus contain While information systems were once primarily used to automate manual processes, they havetransformed the nature of work and the shape of organizations themselves.(A) True(B) False Boris wants to remove a workbook window from his workplace. What series of clicks can he use to hide it 1.What is the specific heat capacity of granite when 20 kg absorbs 237 000 J of heat energy, causing its temperature to increase by 15 C? (you are finding c) 2 Which number sentence shows the product of a number and its reciprocal? A 0=0 c 1 = B / / 2 = 1 D 2 3 = 4/20 49 water leaks from a tank at a rate of 2 5t liters/hour, where t is the number of hours after 7 am. how much water is lost between 9 and 11 am? I want this poem full in english PLZZZZ True/False. a person with syphilis in the latency stage may have no symptoms for years.