Computers and Technology, 01.04.2021 16:30 amandaparrish2323
___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
Answers: 1
Computers and Technology, 22.06.2019 16:00
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 3
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
Computers and Technology, 23.06.2019 14:30
Select the correct answer. a company wants to use online methods to target more customers. it decides to conduct a market research by collecting the data of a few customers with their consent. they want to track data of the sites that their customers frequently visit. which software can the company? a. spyware b. bots c. adware d. trojan horse e. rootkits
Answers: 1
Computers and Technology, 23.06.2019 17:00
1. which of the following is not an example of an objective question? a. multiple choice. b. essay. c. true/false. d. matching 2. why is it important to recognize the key word in the essay question? a. it will provide the answer to the essay. b. it will show you a friend's answer. c. it will provide you time to look for the answer. d. it will guide you on which kind of answer is required.
Answers: 1
___are designed to infect and cause damage to operating system files, computer registry, and other l...
Mathematics, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Health, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Law, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Geography, 19.05.2021 20:20
Mathematics, 19.05.2021 20:20
Geography, 19.05.2021 20:20
History, 19.05.2021 20:20