Which option should you choose to change the background of your current slide?

Design Background
Format Background
Theme
Variant

Answers

Answer 1

Answer: Format Background

Explanation:

If you want to change the background of your current slide on PowerPoint then the correct button to use is Format Background.

You can find it by clicking on the ''Design'' tab, it will be at the far right afterwards.

You can also right-click the smaller version of the slide to the left of the screen and you will see Format Background in the options.

Answer 2

Answer: Format Background

Explanation: Try it, it really works!


Related Questions

Squared Age as Year - A person born in 1980 can claim "I will be x years old in the year x squared." Write a python program to calculate how old a person born in 1980 will be when the value of their age (x) squared is equal to the year they are x years old on their birthday.

Answers

Answer:

40

Explanation:

its simple math

84 the the rout of 54

3. Sum of Numbers Assume that a file containing a series of integers is named numbers . dat and exists on the computer's disk. Design a program that reads all of the numbers stored in the file and calculates their total.

Answers

Answer:

The program written in Python is as follows:

file_handler = open("numbers.dat","r")

nums = 0

for line in file_handler:

     try:

           nums+=int(line)

     except ValueError:

           continue

file_handler.close()

print("Sum: "+str(nums))

Explanation:

The file handler is used to enable the program reads content of the file numbers.dat

file_handler = open("numbers.dat","r")

This initializes the sum of numbers to 0

nums = 0

This iterates through the line of the file

for line in file_handler:

The try exception is used to prevent program crash if data other than integer is read

     try:

This adds numbers on each line

           nums+=int(line)

This exception is returned for data other than integers

     except ValueError:

           continue

This closes the file handler

file_handler.close()

This prints the calculated sum

print("Sum: "+str(nums))

Which form of data does the image represent? (10 points)

A. Analog data
B. Digital data

Answers

Where is the image?, I cant answer if there is no image
b
.......…..................

To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi

Answers

Answer: two

Explanation:

Organizational memory is simply referred to as the accumulation of data or information that have been created for a particular organization.

To solve the difficulty of scaling memory organization, memories are physically organized into a two dimensional organization.

Is there anyone to awnser Tech questions​

Answers

Answer:

yes

Explanation:

yes please i know the answer

Write a function that returns the info of the kth element of the linked list. If no such element exists terminate the program. (getKThElement)

Answers

Answer:

Explanation:

The following code is written in Java and creates a function that takes a LinkedList as a parameter then the function asks the user for which position element they would like to retrieve, loops through the LinkedList, and returns the info on that element position. If that position is not found then the program ends. Position variable is subtracted by 1 in the loop since elements start at 0 in data structures.

 public static void searchForElement(LinkedList<String> myArr) {

       Scanner input = new Scanner(System.in);

       System.out.println("What position do you want to search for?");

       int position = input.nextInt();

       for (int x = 0; x < myArr.size(); x++) {

           if (position > myArr.size()) {

               break;

           }

           if (x == position - 1) {

               System.out.println(myArr.get(x));

           }

       }

   }

Using E-commerce , how you can make Secure payments

Answers

Answer:

requesting a receipts for every payment

Explanation:

after making a payment you have to request a receipt it might be printable or electronic

what happens if the formula or if the function is typed incorrectly? give some common error displayed in ms excel 2007 and their possible reason

Answers

Answer:

Excel displays the #VALUE! error when a formula has the wrong type of argument.

Explanation:

You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
from random import *

# Generate and save a random number.
correct =
(1,10)
NEED HELP FAST

Answers

The code to generate a random number from 1 to 10 is as follows:

import random

print(random.randint(1,10))

The code is written in python.

Code explanation:The first line of code is used to import a module name "random". The random module is use to generate the random numbers.The second line of code, we use the object in random to generate integers from 1 to 10. The print statement is then used to print the random numbers from 1 to 10. Running the code we generate random numbers between 1 to 10 as required.

learn more on python code here: https://brainly.com/question/26104476?referrer=searchResults

Answer:

randint

Explanation:

Got it correct on edge

A business that helps people find jobs for a fee

Answers

career coaches is a business that help people to find job for free

Steve is creating a document with proper nouns, which Word continues to identify as being misspelled.

Which of these steps should he do in this situation?

Skip the Spell Checker.
Right-click the noun and choose Ignore All.
Right-click and Add to dictionary.
B and C are correct.

Answers

B and c are correct answer

"Write an SQL query that displays the Ssn and Last name of all employees who is a supervisor of a Department Manager"

Answers

Answer:

SELECT Ssn,

             Last_name

 FROM employees

WHERE position = supervisor;

Explanation:

SELECT is an SQL query statement that is used to initiate the display of wanted variables.

The names of the variables often succeed the SELECT statement and they are separated by commas.

FROM is an SQL query statement that indicates the table fro which the selected variables be displayed.

WHERE is used to filter your search and return only rows that meet the criteria.

; signifies the end of a query and calls for an execution.

The function changeLocation is also called a _____.

class bike:
def __init__(self,size,idNum,color ):
self.size = size
self.location = 10
self.color = color
self.idNum = idNum

def changeLocation(self,newLocation):
self.location = newLocation


manipulator

initiator

method

constructor

Answers

Answer:

The answer is a method

Explanation:

Answer:

class and self

Explanation:

class Bike:

def __init__(self, str, float):

self.color = str

self.price = float

Question # 6
Dropdown
Choose the line of code that completes this program.

Output:

dog named Tiger

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

# main program
myPetA = pet('dog', 'Spot')


print(myPetA)

Answers

Answer:

myPetA.changeName('Tiger') should be it

Explanation:

Answer:

myPetA.changeName('Tiger')

Explanation:

Correct answer edge 2020

which of the following is a valid c++ identifier a. mouse b. _int c. 2_stop d. float​

Answers

What are you taking abt

need help with my cs110​

Answers

Yes so the it’s C 283 cause I think yes can

Vehicle identification number, color, weight, and horsepower best exemplify: A. data markers. B. attributes. C. entities. D. entity types. E. identifiers.

Answers

Answer:

The appropriate alternative is option B (attributes).

Explanation:

An attributes or attribute seems to be a key cornerstone of good governance provided to individuals, a community, as well as something else.  Your greatest trait may be individuals ability to support others besides such as stopping traffic such that the duck or a bird community will further drive down the path.  

Other options really aren't connected to something like the situation in question. So the choice above would be right.

You should not be more than 5 minutes early to your interview because it makes you look desperate to get the job. A. True B. False

Answers

Answer: I believe this is false. When you arrive early for an interview, you give the impression that you are a responsible and punctual person, and that you take other people's time with respect.

Answer:

B

Explanation:

Help meee pleaseeee

Answers

Answer:

1. DO, RECEIVE

2. PERFORM

3. STORE, TAKE IN, CALCULATE

4. EXPRESS

5. COMPUTE, DISPLAY

Explanation:

1. A computer DO or RECEIVE data

2. Modern automatic digital computers PERFORM more than 100 mln operations in each second

3. A computer STORE information or data, TAKE IN a sequence of operations on information and CALCULATE answers.

4. The hardware inside the computer EXPRESS arithmetical operations or logical relations

5. When the computers COMPUTE results, they DISPLAY them.

1. DO, RECEIVE

2. PERFORM

3. STORE, TAKE IN, CALCULATE

4. EXPRESS

5. COMPUTE, DISPLAY

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as what type of attack

Answers

Answer:

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as

TCP Session Hijacking.

Explanation:

TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network.  The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server.  To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.

ark titanoboa taming

Answers

Huh???????................

it is a passive tame throw the an egg down and it will eat it if it attacks you or gets attacked it will reset the taming process

Explanation:

Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.

Answers

Answer:

A better RPG game all the one that are existing are the same dull thing

Explanation:

Answer:

There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.

You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings?
a. Disk
b. Does not matter
c. SRAM
d. Flash
e. DRAM

Answers

Answer:

d. Flash

Explanation:

A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.

In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.

Which of these is an example of collective voice?
A. He hopes to make the world better for his children.
B. I have always dreamed of a kinder and better world.
C. We are here to make a better world for our children.
D. Your purpose is to make the world a better place.

Answers

Answer:

option C

hope it helps! please mark me brainliest..

Merry Christmas good day

Answer:

c

Explanation:

Should the security researcher have published exploit code that affects every version of Windows and cannot be patched

Answers

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resends lost packets. It attempts to fix bad packets but does not resend lost packets. It does not attempt to fix bad packets or resend lost packets. It fixes bad packets and resends lost packets.

Answers

Answer:

The User Datagram Protocol (UDP) is called the connectionless protocol because:

It does not attempt to fix bad packets or resend lost packets.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

is anyone a robIox creator?
me and some of my friends are going to work on a robIox game and we need someone to help us build and script it.
anyone wanna help?

Answers

Well, I am now getting into making Robl. games, so I would be able to help.

But the only downside is that my computer isn't working at the moment and may take a while to fix. But i'm sure when i am done with it, I could help.

Importance of individual differences in difference in work potential with examples

Answers

Individual differences are how people differ from one another. Each individual in an organization has their own style of behavior. Individual differences are crucial for supervisors to comprehend because they influence employees' feelings, thoughts, and behavior.

What is work potential?

The innate ability of every person to live and perform in alignment with their highest self is referred to as work potential.

Overall, studying individual differences helps us understand not only what makes humans similar, but also what makes them different.

We can best understand the full range of human behavior by taking into account the variations that can occur from one person to the next.

Thus, individual differences in difference in work potential is crucial.

For more details regarding work potential, visit:

https://brainly.com/question/24947234

#SPJ1

write c++ program from 1to 100 to find prime numbers using statement.

please help me​

Answers

Answer:

int count;

for (int i = 1; i <= 100; i++){

count = 0;

for (int j = 1; j <=i; j++)

if (i%j==0) count ++;

if (count == 2) cout << i << " ";

}

In a paragraph or two, discuss the similarities and differences between NTFS, Share, and Linux permissions..

Answers

The similarity between NTFS Share and Linux permissions is that they change the access permissions.

The difference is that NTFS permissions allow you to provide users with more granular access while share permissions are easier to manage and apply.

How to illustrate the information?

Share permissions do not apply to users who are logged in locally to the server, but NTFS permissions do. Share permissions, as opposed to NTFS permissions, let you limit the number of active connections to a shared folder. Share permissions are set up in the "Permissions" settings' "Advanced Sharing" properties.

The most restrictive permission will take precedence over the other if you employ NTFS permissions and sharing permissions simultaneously. The user will only be able to read the file or have a look at the things in the folder, for instance, if NTFS share permissions are set to Full Control but share permissions are set to "Read."

In conclusion, NTFS permissions allow you to provide users more granular access while share permissions are easier to manage and apply.

Learn more about Linux on:

https://brainly.com/question/25480553

#SPJ1

Other Questions
Answer this question please Explain the difference between the law of definite proportions and the law of multiple proportions. Mr. Sowers wants to purchase expo markers for his classroom. He has a budget of $35. A four-pack of markers costs $5.49, including tax. Write and solve an inequality, using x for the variable, to solve for the number of packs of markers Mr. Sowers can purchase. when phenomenological researcher record their thoughts and reactions to the research process, participant responses, and participants non-verbals, they are engaging in what is best known as GIVING BRAINIEST IF CORRECT!!!!Multiply and express in simplest radical form. budd j, cusi k. nonalcoholic fatty liver disease: what does the primary care physician need to know?. am j med. 2020;133(5):536-543. doi:10.1016/j.amjmed.2020.01.007 solve this please and thank you Construct a frequency distribution for the data using five classes. Describe the shape of the distribution.The data set: ages of dishwashers (in years) in 20 randomly selected households table ( (12 6 4 9 11 1 7 8 9 8)(9 13 5 15 7 6 8 8 2 1) ) 2-124. Troy is a fan of baseball, and his favorite player is Moe Jauer of the Minnesota Triplets. Troy made a table displaying how many home runs Jauer hit during his first five seasons. Graph Troys data. Which accurately describes a letter written during the time a historical event occurred?O A. effective secondary source documentOB.too blased for historical evidenceO C.too focused for historical evidenceOD.unrellable narrative sourceO E. useful primary source document Please help me please topic ideas for the question of gp project team in disease and health If your front lawn is 18.0 feet wide and 20.0 feet long, and each square foot of lawn accumulates 1450 new snowflakes everyminute, how much snow, in kilograms, accumulates on your lawn per hour? Assume an average snowflake has a mass of1.60 mg. A 4.00100-g glass coffee cup is 20.0C at room temperature. It is then plunged into hot dishwater at a temperature of 80.0C, as shown in Figure 12-18. If the temperature of the cup reaches that of the dishwater, how much heat does the cup absorb? Assume that the mass of the dishwater is large enough so that its temperature does not change appreciably. drugs classified as depressants typically a) speed up metabolism. b) slow down neural transmission and behavior. c) increase the likelihood of the sympathetic nervous system becoming active. d) act as antagonists that block the effect of gaba. Enzymes provide a site where reactants called substrates can be brought together in an enzyme-catalyzed reaction. The site is called the. Provide a thoughtful reflection to this question: From the dates listed below, what kind of atmosphere did the people who lived in Western Europe during this time experience? Explain. based on your hypothesis, you predict that the chemical isolated from the fungus will successfully kill cancer cells. to test this prediction, you design the following experiment. Throughout the novel to this point, steinbeck has used several occasions to comment on the relationship between george and lennie. How does steinbeck comment on the relationship at the beginning of this passage? why do you think he feels that it is necessary to revisit the nature of relationships between men in the depression?. Help me please thank you.