answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
2 years ago
5

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi

s. On which tab is the Ruler option found?
Home
Insert
View
Design
Computers and Technology
2 answers:
shusha [124]2 years ago
8 0

Answer:

It can be found on View tab.

Explanation:

The view tab on Microsoft Power point is the 9th tab when counting from the left. When clicked, the view tab displays a number of tools that are aimed at visualizing how slides appear.

The ruler function is one of those tools. It is used to ensure that an object is placed or appears at a specific location in the slides. The ruler tool can be found in the Show Box which is the third box from left after Presentation View and Master View.

vladimir2022 [97]2 years ago
6 0

Answer:

view tab.

Explanation:

Got a 95% so i guesss that's reason enough.

You might be interested in
As a security engineer, compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Whi
Mama L [17]

Answer:

See below

Explanation:

In case of a homogeneous network, Skype is an example and OpenTable is an example of a heterogeneous network.

<u>Homogeneous</u> networks are easier to get started with since its all pre-integrated, and even the troubleshooting is more convenient if a problem arises. However, it then becomes a security concern if you choose to place all that power to a single vendor - known as ' monoculture'. One event can affect the entire network. On the other hand, a <u>heterogeneous</u> set up does not run this risk. Several different components are utilized which are not as vulnerable to security threats.

In conclusion, homogeneous networks cost more and heterogeneous networks are more secure.

8 0
2 years ago
The part of the computer that contains the brain, or central processing unit, is also known as the A.monitor B.modem C.keyboard
olga_2 [115]
<span>The part of the computer that contains the brain, or central processing unit is also known as System Unit.Because Cpu plays a vital role and it is the central component in computer.Without Cpu calculations are not performed by computer.It directs the entire computer system to carry out stored program instructions.</span>
5 0
2 years ago
Justin signed a rental agreement for his new condo. How long is his lease? a p e x
kaheart [24]

Answer:

12 months

Explanation:

The options are:

18 months

9 months

6 months

12 months

The lease is being signed for one year, and that is 12 months. And it is being renewed after that through an agreement between the landlord and the tenant. And hence, the correct option here is the 12 months since the lease is legitimate for 12 months only by default.

5 0
2 years ago
A network router connects multiple computers together and allows them to send messages to each other. If two or more computers s
Sedbober [7]

Answer:

C = M0(M1+M2+M3)+M1(M2+M3)+M2M3 is the equation which suits

Explanation:

From the given data we can state that we need to activate only one product i.e 1------>activated 0-------->means inactivated and also only one slot is activated at a time.The resultant will be no data inputs n control bits and 2 to the power n output bits.

8 0
2 years ago
Given three dictionaries, associated with the variables, canadian_capitals, mexican_capitals, and us_capitals, that map province
Nookie1986 [14]

Answer:

The Python code to combine the three dictionaries are is given as follows:

  1. canadian_capital = {
  2.    cash: "SOME VALUES",
  3.    assets: "SOME VALUES"
  4. }
  5. mexican_capital = {
  6.    cash: "SOME VALUES",
  7.    assets: "SOME VALUES"
  8. }
  9. us_capital = {
  10.    cash: "SOME VALUES",
  11.    assets: "SOME VALUES"
  12. }
  13. nafta_capital = {
  14.    canadian: canadian_capital,
  15.    mexican : mexican_capital,
  16.    us: us_capital
  17. }

Explanation:

<u>Line 1 - 14 :</u>

Create three Python dictionaries and name them as <em>canadian_capitals, mexican_capital </em>and<em> us_capitals</em>. Please note a Python dictionaries should be enclosed in curly braces { }.  

We just define two samples of relevant keys (<em>cash </em>and <em>asset</em>) in each of the dictionaries. Python dictionary can map a key to a value.

Since we are not given any capital values from the question,  a dummy string "<em>SOME VALUES</em>" is tentatively set as the value for each of the keys.

In practice, we should replace those dummy strings with the real values of capital. The values can be a number, a string, a list and even a nested dictionary.

<u>Line 16 - 20 : </u>

Create one more Python dictionary and name it as <em>nafta_capital</em>.

Since our aim is to combine the three previous dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em>) and associate it with <em>nafta_capital</em>, we can define three different keys (<em>canadian, mexican </em>and <em>us</em>) in our dictionary nafta_capital.

As mentioned, a value associated with a key can be a nested dictionary. Hence, we just map <em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> as the value of the keys (<em>canadian, mexican </em>and<em> us</em>) in dictionary<em> nafta_capital,</em> respectively,

By doing so, we have managed to combine three target dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> ) into a single dictionary, <em>nafta_capital</em>.

4 0
2 years ago
Other questions:
  • Exercise 6.3 consider memory storage of a 32-bit word stored at memory word 42 in a byte-addressable memory. (a) what is the byt
    14·1 answer
  • In cell q9 enter a formula using the countif function and structured references to count the number of staff members who have pa
    9·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    7·1 answer
  • Raj, a recent graduate, has recently joined your organization as a Junior Business Analyst. He has been asked to conduct a Feasi
    11·1 answer
  • Nathan would like to save his PowerPoint presentation as a video that can be replayed easily on any device at full quality. Whic
    14·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
    11·1 answer
  • Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular lan
    5·1 answer
  • Select the described workplace culture from the drop-down menu.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!