Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in. What feature is Lucy's teacher referring to?

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in.

The teacher referring to the Transitions effect that is push while making the slides.

You can insert different Transition effect on your slides while going through the Transitions tab on the ribbon, and then select your desired effect on the selected/active slide. There are tens of transitions effect, you can search for your desired effect on your slide, such as Lucy's teacher suggested to her to add a push-in effect.

Answer 2

Answer: Transition, I just finished my test for this lesson! I got an 100% on it!

Explanation: When you go and read through the lesson, there's a page telling you about each tab. When you go to "Transitions", there is an image that shows the features for transitioning your slides. The options shown in the picture is "existing", "none", "morph", "cut", "fade", "wipe", and "push".


Related Questions

Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview

Answers

Answer:

Page Layout view

Explanation:

Answer:

C. Page layout view

Explanation:

Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?

Answers

Explanation:

It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.

In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.

What are three techniques used to generate ideas? O A. Free writing, brainstorming, and concept mapping O B. Free writing, clustering, and detail mapping O c. Free writing, pre-writing, and drafting O D. Pre-writing, drafting and revision​

Answers

freewriting brainstorming and concept mapping

Both pre writing and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

What is Pre-writing or surveying?

Pre-reading or surveying is the process of skimming a text to locate key ideas before carefully reading a text (or a chapter of a text) from start to finish. It provides an overview that can increase reading speed and efficiency.

Reading strategies aim to facilitate the understanding of difficult texts. These strategies are very effective and can facilitate not only reading but also the interpretation of the text. Among the reading strategies, we can mention the use of context clues, which facilitate the understanding of difficult and unknown words.

Synthesizing the text is also a very beneficial strategy, as it allows the text to become smaller, more objective, and direct. Reading strategies should be used even by people who find it easy to read texts with different difficulties, as it allows the text to be understood in a deeper and more complete way.

Therefore, Both prereading and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

More information about context clues at the link:

brainly.com/question/8712844

#SPJ2

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.

I need help with my previous question please

Answers

I can’t find your previous question :(

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

They are connected through networks

Explanation:

N/A

Answer:

the other guy is correct

Explanation:

Which of the following tools can be used to aggregate relational data from multiple sources?
A.)Power Pivot
B.)PivotTables
C.)Get & Transform

Answers

Answer:

ApOWER PIVOT

Explanation:

The tools that can be used to aggregate relational data from multiple sources is Power Pivot.

Data aggregation is the known as putting or gathering of data and presenting a summary form of it.

The data can be gathered from multiple data sources with the intent of combining these data sources into a summary for data analysis.

conclusively, Data warehouses gives users room to run queries, compile reports, generate analysis, and retrieve data in a consistent format.

Learn more from

https://brainly.com/question/21263038

Write a function that returns a pointer to the maximum value of an array of float ingpoint data: double* maximum(double* a, int size) If size is 0, return NULL.

Answers

Answer:

double * maximum( double arr[], int size){

   int max = 0;

   if ( size == 0){

       return 0;

   } else {

        for (int i = 1; i < size; i++){

           if (arr[i] > arr[0]){

               max = arr[i];

           } else {

               max = arr[0];

           }

         }

         return max;

   }

}

Explanation:

The C++ source code above returns the maximum value of an array as a pointer. The function accepts two parameters, the array in question and the size of the array. The for loop iterates over the items in the array and checks for the largest, which is returned as a pointer since the function "maximum" is defined as a pointer to the floating-point number memory location.

A man is charged a fee by the city for having numerous broken cars and auto parts in his front yard. Which of the following correctly describes why the city punishes him? He has committed a crime. He is in violation of a city statute. He has violated an amendment of the U.S. Constitution. A judge has decided that he is in violation of civil law.

Answers

Answer:

Violation of city Statute

         

Answer:

B

Explanation:

Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.

Question 6 options:

True

False

Answers

Answer:

True

Explanation:

Hello again, just need help debugging-I honestly have no idea how the "isSpace" etc methods work and I've tried various syntaxes (string name, Character., etc.) to no avail. Also getting errors for the c= sections for converting between char, string, and boolean which I understand, just dont know how to fix. I'm aware I could condense my initial variables, I just like them laid out. The code aims to count lowercase vowels, all consonants, spaces, and punctuation. Anything else will get thrown into a misc count.


import java.util.Scanner;

public class MyClass {

public static void main(String args[]) {
Scanner s=new Scanner(System.in);
System.out.println("input the string");
String as=s.nextLine();

int cons=0;

int a=0;

int e=0;

int i=0;

int o=0;

int u=0;

int space=0;

int punc=0;

char c;

int misc=0;

for(int k=0;k(LESS THAN)as.length();k++){
if(as.isSpace(as.charAt(i))){
space++;
}

else if(as.isConsonant(as.charAt(i))){

cons++;

}

else if(as.isPunctuation(as.charAt(i))){

punc++;

}

else if(as.isVowel(as.charAt(i))){

c=as.charAt(i);

if (c="a"){

a++;

}

else if(c="i"){

i++;

}

else if(c="e"){

e++;

}

else if(c="o"){

o++;

}

else if(c="u"){

u++;

}

else{

misc++;

}

}

else{

misc++;

}

}

System.out.println(a+" a's");

System.out.println(e+" e's");

System.out.println(i+" i's");

System.out.println(o+" o's");

System.out.println(u+" u's");

System.out.println(space+" spaces");

System.out.println(punc+" punctuations");

System.out.println(cons+" consonants");

System.out.println(misc+" misc. (uppercase vowels, etc.");


}

}

Answers

import java.util.Scanner;

public class JavaApplication81 {

   

   public static void main(String[] args) {

       Scanner s = new Scanner(System.in);

       System.out.println("Input the string");

       String as = s.nextLine();

       int cons = 0;

       int a = 0;

       int e = 0;

       int i = 0;

       int o = 0;

       int u = 0;

       int space = 0;

       int punc = 0;

       char c;

       int misc = 0;

       String punctuation = ".!,?";

       String consonants = "bcdfghjklmnpqrstvwxyz";

       for (int k = 0; k < as.length(); k++){

           c = as.charAt(k);

       if (Character.isWhitespace(c)){

           space ++;

       }

       else if (punctuation.indexOf(c) != -1){

           punc++;

       }

       else if (consonants.indexOf(c) != -1){

           cons++;

       }

       else if (c == 'a'){

           a++;

       }

       else if(c == 'e'){

           e++;

       }

       else if (c == 'i'){

           i++;

       }

       else if (c == 'o'){

           o++;

       }

       else if (c == 'u'){

           u++;

       }

       else{

           misc++;

       }

       

   }

       System.out.println(a+" a's");

       System.out.println(e+" e's");

       System.out.println(i+" i's");

       System.out.println(o+" o's");

       System.out.println(u+" u's");

       System.out.println(space+" spaces");

   

       System.out.println(punc+" punctuations");

       System.out.println(cons+" consonants");

       System.out.println(misc+" misc. (uppercase vowels, etc.");

   }

   

}

This is one example of how it could be done.

Other Questions
Which of the following shows the correct sums that would be found when clustering is used to find the answer to the problem 34 x 12?340 + 68 = 408340 + 34 = 374340 + 68 = 398300 + 8 = 308 A scientist discovered a new type of bacteria that will grow at a rate of 3 cells every 2 seconds. If the scientist starts with one bacteria cell in a petri dish, what equation could predict the amount of cells in the dish after x seconds? Please help me Jeff got a 23/25 on his first math test, a 93% on his second test, and a 0.89 on his third test. Which of the following orders his scores from least to greatest? Explain the importance of the Battle of Britain. Which situation is an example of indirect taxation?A. Every citizen sends the government money to support the armedforces.B. Stores charge sales tax on each purchase and give that money tothe governmentO C. Homeowners must pay a percentage of their home's worth to thegovernmentD. Businesses must send a portion of their income each year to thegovernment Which ratio is equivalent to 3;9? what is the difference b/n social and histry A number N divided by -9 is -16 What is the slope of this line? Answer the following questions. Plz helpssssssssssssss. Sandstone19. Obsidian is a type of volcanic glass that is formed when lava cools. Obsidian isa/ana. intrusive igneous rockc. sedimentary rockb. extrusive igneous rockd. metamorphic rock luke had 49 crackers. he gave a equal amount to his 4 friends . how many crackers where left over? The Federal Reserve can influence the interest rate on home mortgages by:A. shutting down banks that refuse to follow the federally advisedrate.B. changing the interest rate it pays banks for their reserves.C. establishing federal mortgage lenders to compete with privatebanks.D. increasing taxes on all deposits held in its member banks. What does the law of supply suggest?A. The equilibrium price for a product is decided only by buyers.B. The amount of product sellers create is based on the product'sprice.O c. The amount of product buyers purchase is based on the product'sprice.O D. The equilibrium price for a product is decided only by sellers. A function has the function rule y = x - 7. If the input is 4, what is the output?A. 3B. -3C. 11D. -11 You have 48 markers, 64 stickers, how many bags can you put them in equally What is the reason for the Muslim leader Jinnah to insist on separating from India? 1+1+???????????????????????? HELP WILL GIVE BRAINLEST FOR CORRET ASWER