Make your own Multimedia Presentation using Microsoft Powerpoint. The presentation must be all
about yourself. Make it presentable with animations and transformations, attach file, audio or
images to make it more fun and exciting. Limit it to 5 slides only, tell something about yourself,
your hobbies, dreams, aspirations, achievements, likes and dislikes, etc. Attach your output upon
submission to the assignment given.

Answers

Answer 1
Dm me ill do it for 20 points

Related Questions

Which of the following programs completes similar functions as those completed by Microsoft® Publisher?

Question 1 options:

Microsoft Access


Microsoft Outlook


Microsoft PowerPoint


Microsoft Word

Answers

Microsoft Word does many of the same tasks that Microsoft Publisher does.

Microsoft word:

Microsoft Word is a tool that is used to write documents in the educational field. It is maintained by Microsoft and may be utilized in a variety of fields, including research.

Created By Microsoft processor that was created by the company Microsoft. It offers comprehensive capabilities that let you format and modify your files and documents in the most efficient way possible.

Find out more information about 'Microsoft word'.

https://brainly.com/question/17145954?referrer=searchResults

A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the number of lives is written to a configuration file on the gamer's phone. A hacker loves the game but hates having to buy lives all the time, so they developed an exploit that allows a player to purchase 1 life for $0.99 and then modifies the content of the configuration file to claim 100 lives were purchased before the application reading the number of lives purchased from the file. Which of the following type of vulnerabilities did the hacker exploit?
a. Sensitive data exposure.
b. Dereferencing.
​c. Broken authentication.
​d. Race condition.

Answers

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is d. Race condition.

What is a race condition?

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at https://brainly.com/question/13445523.

Create a list that will contain 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom”.

Answers

A list that contains 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom” is as follows:

list1 = ["badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "mushroom" "mushroom"]

Code explanation

List are used to store multiple items in a variable. The items stored accommodate different datatype. List are represented with a square bracket "[]". The elements stored are placed inside the square brackets.

The python list is stored in the variable list1The python list has the first 12 elements as "badger" and the last two elements as "mushroom".

learn more on list here: https://brainly.com/question/24941798

Question 1 (1 point)
These errors can be difficult to identify, because the program still runs but it does
not do what you expect it to do.
1.Runtime
2.Logic
3.Syntax
4.Executing

Answers

Answer:

Logic

Explanation: I took the test in k12 and got it correct

Fundamental of Computer Science
Prompt:
What is a class that you believe you could learn just as well in an online class as an in
person class? What is a class that you think you need to have in person if you want to learn
and pass the course? How are these subjects different? What factors contributed to your
decision?

Answers

Answer:

Coding and Hardware Hacking

Explanation:

You can learn coding just as well through a online class or even on the internet through yo*tube than an in person class whereas it would be alot easier learning hardware hacking in person because you are given the opportunity to ask and can be corrected for small mistakes due to the task being manual. Coding can be learnt online independently if needed although so can hardware hacking but having a teacher to correct you and teach you handy tricks from their experience will get you further in that sense.

Your best strategy would be to use a heuristic if ________ is most important; your best strategy would be to use an algorithm if ________ is most important.

Answers

Answer:

First blank : Time

Second blank : Being right

2.1.2 write a paragraph to explain why these types of technology are beneficial to the users of the gautrain in 2022. Take the current situation in South Africa into consideration when answering this question 2 answers

Answers

The use of different technologies such as ATP and the "Standard Gauge" is beneficial for users of the gautrain train, as it promotes greater safety and passenger comfort.

Gautrain Technologies

The Gautrain train uses a track gauge called "Standard Gauge" which generates greater safety at high speeds. In this device there is an alarm system that guarantees safety in case of accidents, promoting the necessary actions.

There is also a suite of ATP tools that are used on board to prevent information security threats and attacks.

Therefore, the Gautrain train is a fast, modern and safe means of rail transport that has 80 km and connects the city of Johannesburg to the OR Tambo International Airport, in addition to making the line to Pretoria, the capital of South Africa.

Find out more information about transport technologies here:

https://brainly.com/question/25935364

10. What is the value of favorite Animal after the code below is run?
animals = [ 'dog', 'cat', 'cow', 'pig' ]
favoriteAnimal = animals[2]
[1 point]
O a. dog
O b.cat
O c. cow
O d. pig

Answers

Running the code

animals = [ 'dog', 'cat', 'cow', 'pig' ]

favoriteAnimal = animals[2]

will give a result of

"cow"

According to the results of a testing process, Ron, an application tester, has made some changes to the application. Now, he wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should he perform

Answers

Answer:

Regression

the answer is a Regression test

hope this helps

scav

A global _____ system is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

Global Positioning System

Explanation:

also stands for GPS

np :)

what is the salary for an average software dev?

Answers

Answer:

$73,213

Explanation:

Answer:

500

Explanation:

maybe ldk I'm not a electronic seller

Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the internet? how many unique addresses would there be?.

Answers

The number of unique addresses that can be supported on the devices with 4 bits will be 16.

What is an internet protocol?

An internet protocol is a protocol that describes the structure of an internet address and then allocates a unique address to each internet-connected device.

However, we need to understand that one bit can only support four addresses.

Therefore, we can conclude that the number of unique addresses that would supported by 4 bits will be 16.

Learn more about Internet protocol here:

https://brainly.com/question/18215126

UNIT 2 TEXT QUESTIONS
Critical Thinking Questions
How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?
The unit has you writing a script that ends each level when a sprite gets to the right edge of the screen. Propose another “level completed” solution where the levels ends when the player hits a certain part of the screen WITHOUT relying on coordinates. Describe your solution, including the code blocks you would use instead of coordinates. (Hint: think about landing on a target or crossing a finish line!)
Propose at least two different ways you might increase the difficulty of a level by altering a characteristic of an enemy sprite in Scratch.
Think of video games that you find immersive. Identify two qualities those games have that draw you in.
Think about or propose a board game or video game that has an extremely high degree of customization. Explain why that game is highly customizable.

Answers

Answer:

I was doing this exact assignment, so you could use my answers as long as you reword them using a paraphrasing program or use these answers as added help with yours

Explanation:

Cheers!

While you are using some files on a workstation running Linux, you determine that a few of the files seem to be corrupted. What should you do

Answers

The best thing to do is to close all files and applications and run fsck.

What is an Application?

This is defined as a computer program designed to carry out a specific task and is used by end-users.

When few files seem to be corrupted, it is best to close all applications and run fsck command as it helps to check and interactively repairs inconsistent file systems.

Read more about Corrupted files here https://brainly.com/question/2596545

Which type of shape allows you to add text that can be moved around.

Answers

Answer:

Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.

Complete the sentence.
Accessibility benefits______

• everyone
• people with impairments

The goal of accessibility is to provide_________

• access for as many people as possible
• access for 100 percent of users


Answers

Answer:

Complete the sentence.

Accessibility benefits______

• everyone

• people with impairments✔

The goal of accessibility is to provide_________

• access for as many people as possible✔

• access for 100 percent of users

I put a tick in the answer

Answer:

people with impaired,

access for as many people as possible

Explanation:

NET
Dale
Date
Assignment is
Directions
lasiname
Martin

F
18.00
estech
200.00
70.00
10 Add your lint name All your last name
1 peny
Dan
Thompson
Den
13 Westwo
1 ye
Joseph
15 mg
16 Read
Linda
E
All your los
$
200.00
US
RIGES
Pay Check PM Elechile in Car Note Neni Cable/Phone Gas
5,000.00 216.00 550.00 5,190,00 150,00 200.000 200.00
3.000.00
13.00 350.00 375.00
100.00 150.00 3 150.00
$
3,000.00 100.003 295.00 95.00
190,00
3.300.000 10.00 100.000 300.00
199.00
2.360.00 18 122.0080.00 500.00 100.00 39.00 35.00
200.00 65.00 100.00
150.00 150.00 50.00
500.00 38001318.00 050.00 18 100,00 200.00 210.00
100.00 123.00 160.00
750.00
JO
200,000.00 38.00
100.00 110.00 150.00 750.00 0.0001 30.00
5.000.000 30.00 100.00 $ 700.00 200.00 2100018
10.00
200.00 HP.0013
325.00 203.00
12400
200.0013 3800 205 09.150.00 5
39.00
120.00
700.00 S
130.00 100.00 1,000.00
13.00
500.00 2001 100.00 3700.003 200.00 130.00 18.00
100.00 13 102.00 357,00 185.09.15 100.00 157.00 180.00
000.00 15 11.00 50.00 50.00 5 150.00 178.00 200.00
3.100.00 P300 30000 150.00 150.00 50.00 50.00
Amount of consumentaneam
Marcus
Manna
00 DE
10 The
19 0
PO Martin
DU Jones
2 marone
150.00
Man
Mihael
Sheila
00 BLC
avere Pora
bill, the smalles
totaland the
24 Breton
Tony
20
Lommelletti Dill Ave
Consumer Car Note Ayu
sume Rent Ayu
onum Cablehne Ayu
Les in
Totalol You Monthly
You Remaining lumas alte Billa
TAP

Answers

Answer:

Where are the options??

Explanation:

a. What is Flash?
ans..​

Answers

Explanation:

Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection.

the factors of power of device

Answers

Answer:

tfopod

Explanation:

HELP PLEASE
Which app would require two people to know the same language but not require either to speak aloud in order to communicate?

A language learning app
A language translation app
An electronic notepad app
A speech-to-text app

Answers

A language translation app

--------------------------------------------------------------------------------------

A language learning app, like Duolingo, would only require one person, since it person vs computer

An electronic notepad app, i dont think that has anything to do with language?

A speech to text app would defeat the whole purpose of not speaking aloud, so thats not correct.

The only one that makes sense is a language translation app, like iTranslate, which allows people to speak to it, but ONLY if they want, because they can type the words they want to translate.

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

−[tex]WishWolf[/tex]

Answer:

A language translation app

Explanation:

My computer is being weird, Everytime I begin to type something on here it keeps adding a letter to the beginning of my sentence then when I try to go back and fix it it copies and pastes all I wrote down over and over again. I checked my settings and everything seems to be right.

Answers

Answer:

Maybe you have shift lock on since it's highlighting and Ctrl C + Ctrl V your entire text? let me know if im wrong.

Complete the sentence.
"C:\Users\Juanita\AppData\Local/Programs\Python\Python38.32\Unit\" is an example of a _______.

Answer choices:
relative path
path

Answers

The directory given above is typically an example of a path.

What is a path?

A path can be defined as a string of characters that is used to uniquely identify and describe the location of a document, file or folder in a directory structure, especially on a computer system.

The types of path.

In Python programming, there are two (2) main types of path and these include:

Relative path such as "os.path.relpath (path, start)"Absolute path such as "os.path.abspath"

In this scenario, the directory "C:\Users\Juanita\AppData\Local/Programs\Python\Python38.32\Unit\" is an example of a path.

Read more on path here: https://brainly.com/question/20464533

What machine was one of the first to be able to add, subtract, multiply and divide?.

Answers

Answer:

Stepped Reckoner

Explanation:

Gottfried Wilhelm Leibniz constructs the Stepped Reckoner,the first calculator to carry out all four basic arithmetic operations (addition,subtraction,multiplication and division).

Why is it necessary to be familiar with Microsoft Excel?

Answers

Answer:

It is necessary to be familiar with Microsoft Excel because you will be using it throughout your school years. If you don't no how to use Microsoft Excel you will have an hard time doing your assign paper you need to get done.

As a network engineer, you have been creating patch (straight-through) cables for a network switch. You have plugged in all the cables and are testing data transmission through the cables.You notice that the data transmission is not functioning properly in some of the cables and are sure that one of the cables is interfering with the transmission at the near end of the cable.What is this type of interference called

Answers

This type of interference in networking is called cross-talk signal disruption. It may also be referred to as degradations caused by electrical sources or electromagnetic sources.

How does Crosstalk Occur?

Whenever signals traveling along a networking cable interferes with another it leads to electromagnetic disruptions in those signals. This is referred to as Crosstalk.

This can happen within a pair of cabling that is twisted. This can be corrected by:

using shielded networking cables and by keeping the cable further apart.

Please see the link below for more about Networking:

https://brainly.com/question/2970996

Explain why not having a driver for the old printer is a problem​

Answers

Answer:

Because you won't be able to print anything without it, because there would be no connection to the printer

You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks you to prepare a lecture on input and output. What is the role of the operating system to manage and work with each?

This is for a college class... Please answer with a well-developed paragraph, I will mark the answer brainlist.

Answers

Answer:

Input devices : These are the devices that are used to put information or simply give input to a computer system. These are also known as peripheral devices and some of the most common examples of input devices are keyboard and mouse. Output devices… any hardware device used to send data from a computer to another device or user. examples of output devices are monitors and projectors (video), headphones and speakers (audio), or printers and plotters (physical reproduction in the form of text or graphics).

Explanation:

Hope this helps <3

In computer systems, the operating system helps devices communicate and coordinate with software applications.

The operating system helps transfer information between devices that you use to input data (like keyboards or touchscreens) and devices that show or produce output (like monitors or printers).

What is the teaching

For input management, the operating system is responsible for handling data streams coming from various input devices.

When a user interacts with an input device, such as pressing a key on the keyboard or moving the mouse, the operating system captures these actions and converts them into appropriate signals that can be interpreted by software applications.

Read more about output here:

https://brainly.com/question/31242886

#SPJ3

pls help its important ​

Answers

Answer:

I think it's the last one

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. trojan horse worm phishing attack denial of service attack

Answers

Sarah was the victim of a computer attack called phishing (option c)

What is phishing?

Phishing is a computer term that refers to the set of techniques used by a criminal to try to deceive his victim through emails and other digital means.

This deception has the sole objective of stealing confidential information from the victim, such as her bank account password, in order to later steal it.

Based on the above, it can be inferred that Sarah was a victim of phishing because she gave her confidential bank details to an account that was not her official bank account.

Learn more about phishing in: https://brainly.com/question/23021587

As a hardware technician and knowing the internet components of the system unit, list any five(5) of such components.

Answers

Answer:

the motherboard, hard disk drive, optical drive, power supply unit, and in some old systems fan and floppy disk drive.

Hope This Helps!!!

Other Questions
Find the difference.(9ab-5a+4) - (9ab-2) A ribbon 4 m long is cut into 8 equal pieces.What is the length of each piece?Give your answer as a fraction in its simplest form. What types of wastes are ptoduced at your home? Make a list of them. What procedured fo you apply to manage those wadtez? Explain. i cant seem to get the hang of this. Imagine that you have been hired to create an ad explaining why this is a good time to buy lobsters. Describe your ad. What would it show and say? What type of people will you try to reach? How and where will you show your ad so that it reaches them?, use your own ideas, in the answer. what should be added to (-5 a2b - 9 ab) to get a2b + 3 ab? simplify 16/5 +30/7+3/2-13/5 a) When x = 6, what is the value of 4x?10A12B2446DNone of theseEmb) When x = 6, what is the value of 5x + x?36A56B.62566DNone of theseEc) When x = 6, what is the value of x??3A6B1236DNone of theseE What is the equation of the line that passes through the point (-6, -7) and has aslape of 0? Image shows a lake, a factory, a cloud in the sky, a cow, dead organisms, a tree, and the sun. An arrow from the sun to the tree is labeled A. An arrow from the sky to the tree is labeled B. The sky is labeled C above the cloud. The letter D is in the air and an arrow points from it down to dead organisms. An arrow points from dead organisms to the ground labeled E. An arrow points from the cow into to the sky labeled F. An arrow points from the factory to the sky labeled G. An arrow from the sky to the lake is labeled H above the lake.Using the diagram above, match the description to the corresponding location in the carbon cycle model. Provide the letter only.Carbon dioxide is converted to sugar used for food.Carbon trapped in fossil fuels is converted to carbon dioxide.Organic carbon is converted to fossil fuels.Carbon dioxide is converted to carbonates.Sugar is broken down and converted to carbon dioxide.Location ________Location ________Location ________Location ________Location ________Part TwoImages shows a lake labeled carbonates in water, a cow labeled animal respiration, a tree labeled photosynthesis, a factory labeled factory emissions, the sun labeled sunlight, a cloud labeled carbon dioxide in atmosphere, another tree labeled plant respiration, an arrow from organic carbon to dead organism, and fossils and fossil fuels. Arrows are labeled as follows: A from the sunlight to photosynthesis, B from carbon dioxide in atmosphere to photosynthesis, C from factory emissions to carbon dioxide in atmosphere, D from carbon dioxide in atmosphere to carbonates in water, E from dead organisms to fossils and fossil fuels, and F from plant respiration to the sky.Using the diagram above, answer the following questions:True or False. The arrow labeled C represents a transfer of chemical energy to mechanical energy. Explain why this is true or false.True or False. The arrow labeled A represents a transfer of solar energy to chemical energy. Explain why this is true or false.Which arrow or arrows represent a release of carbon dioxide? What process is occurring at the arrow(s) you selected?Which arrow or arrows indicate a process that cycles carbon from living or nonliving organisms? Describe the process or processes you selected.Which arrow or arrows represent reactions that demonstrate a conservation of mass and energy? Explain your answer. Binary fission is the primary reproduction method of. French hw :) Ill mark brainliest two friends share this block of chesse equally what fraction dose each child get Lymph in the cisterna chyli differs in composition from lymph in the general lymphatic stream in that it contains more ________. 6. Who assisted Hercules in killing the giant MAN-EATING BIRDS? A 30 cm scale has one end broken. The mark at the broken end is 2.6 cm. How would you use it to measure the length of your pencilpls tell correct ans In the diagram, the circle is inscribed in triangle PQR. Find arc EF, FG, and GE. 2. Pepper went to the movies and spent $13.83. Howmuch did she spend, rounded to the nearest wholedollar?$ Why is it so important to check the accreditation of a private higher learning institution? Explain TWO reasons hi i need help with this questionBens speedometer showed he was driving 35 miles per hour. A police cars radar showed he was actually driving 40 miles per hour. What was Bens approximate percent of error in his driving speed?