Lillian is creating a presentation about social media and she would like to include transitions to add flair. What does she need to do to make sure her transitions are balanced?

Apply one simple transition to all of her slides.
Use a different transition for each slide.
Add a subtle transition to every other slide.
Give each slide a different duration time.

Answers

Answer 1
apply one simple transition to all of her slides i believe
Answer 2

Answer:

A: Apply one simple transition to all of her slides.

Explanation:

I got it correct on a quiz I did that had this question.


Related Questions

Which element is the first thing you should complete when making a movie?
A script
A storyboard
Opening credits
A video segment

Answers

Answer:

storyboard!!!

Explanation:

its important to have the concept in mind before starting

I think it’s a story book

You send a friend a private message about something personal that is going on with you. Without permission, she forwards your text to everyone on her contact list.

What would you do? Why?

Answers

Answer:

Ask the person to remove the imagePut pressure on the person to remove the message though their peer group and carers.Tell a trusted adult about what is happening and explain the situation, they might have advice tailored to your specific situation.Report it to the social networkIf appropriate then tell the police

Explanation:

Start up a dialogue with the person to find out if they would be willing to take down the message, and find out why they did it as this could prevent a similar situation happening in the future.

Applying pressure though their peer group to conform to your standards is also a good measure to take as they would not want to feel left out.

If any images that you have taken are being shared then you can try to have them taken down under copyright. If personal information was shared then did that breach the laws in your or their jurisdiction?

Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming

Answers

-D. Scamming- like when a telemarketer called you and tries to get you to give personal information

Answer:

its D

Explanation:

ive done this before i remeber i got d

help Which of the following triangles can be proven similar through AA?
Question 1 options:

A)

image

B)

image

Answers

A as in Ate my food ya know

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

Ummmm pls helppp



Which are the features of conditional formatting?
Conditional formatting enables you to_______
and_______

Answers

Answer:

A conditional format changes the appearance of cells on the basis of conditions that you specify.

Explanation:

If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates to True or False).

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

will give brainliest

The height or amplitude of a wave is related to the input of ________

a. energy
b.matter
c.energy and matter

Answers

Answer:

a. energy

Explanation:

The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.

Hope this helped!!!

What is the "thinking work" of the computer? How does it help the computer?

Answers

Answer:

El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción

Explanation:

Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.

The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.

Answers

Answer:

(a): Replace

(b): Hyperlinks

(c): Document Inspector

(d): Compatibility checker

(e): Accessibility checker

Explanation:

You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.

However, further explanation is as follows;

(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.

(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.

(c): Document inspector checks hidden data such as personal information.

(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.

(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.

The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;

REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKER

A) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.

B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.

C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.

D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.

E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.

Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

Other Questions
Is shifting real or is it like a joke? 1. Correct the following dangling constructions by rewriting the sentence.Being naturally shy, dates became a burden to me.2. Correct the following dangling constructions by rewriting the sentence.To sew properly, a pattern should be followed. A homeowner installs a solar heating system, which generates 20 savings at a rate of 300e t dollars per year, t years after installation. Find a formula for the total savings after t years. If the system cost 30000 dollars to install, when will the savings match the installation cost James joins Club One which charges a monthly membershi[ of $ 19.99. How much will James spend in all, if he continues his membership for 6 months? Which one the answer to this question 8 - 5b = -7 ?? whats the b Question 3What is your opinion about the rule? Would you choose to rewrite the caption based on the rule? Explain your answer: !! IMAGE ATTACHED !!Angle RST is a right angle. What is the measure of angle UST? A. 27 B. 36 C. 63 D. 81 What are the consequences of an ecosystem being negatively affected economically? Please help as soon as possible, it means a lot! Thank you. As part of a heat treatment process, cylindrical, 304 stainless steel rods of 100-mm diameter are cooled from an initial temperature of 500 C by suspending them in an oil bath at 30 C. If a convection coefficient of 500 W/m2 K is maintained by circulation of the oil, how long does it take for the centerline of a rod to reach a temperature of 50 C, at which point it is withdrawn from the bath O 1. What group of words is NOT a phrase?bark at motorcyclesHe walks too fast.the blue bowlat the fence What is a major similarity between the World Trade Organization (WTO) andthe World Bank?A. Both promote free trade policies among their member states.B. Both support developing countries at the expense of developedcountries.C. Both encourage their member states to strengthen their tariffs.D. Both operate primarily as microfinance institutions. Anyone else been saved by brainly? Why is courier conjugation different from finir? Please explain- brainliest award will be given as well within 4days If f(x) = (x + 7)2 and g(x) = x2 +9,which statement is true?A fo)B f(-4) > g(-3)C f(1) = g(1)D f(2) > g(2) What type of work were immigrant women likely to do? An outside thermometer reads 57F. What is this temperature in C? Round your answer to the nearest whole number. 14 49 71 135 Who founded the Mauryan dynasty? what is the area of the trapozoid? In the beginning of "A Growing Problem," how does the authorintroduce his argument that nonnative species should not live inFlorida?O A. by comparing Florida to Southeast AsiaOB. by comparing pythons to alligatorsOC. by referencing facts about the dangers of pythonsOD. by referencing people's expectations of the Everglades