What are the individual presentation objects that are found in the PowerPoint program and used to display content to an audience?

files
slides
cells
charts

Answers

Answer 1

Answer:

The answer is slides

Explanation:


Related Questions

what are bananas if they are brown

Answers

they are ripe or overripe (rotten)

if banans are Brown there bad I think

what is astronaut favourite key on keyboard? ​

Answers

The space bar
Thanks for that today
Have a great day

The astronaut favorite key on keyboard ​ is Space-Bar.

What is space bar?

This is known to be a long  key that is seen at the lower part of a computer keyboard or typewriter used to type space.

Conclusively, to Space Key is known to be the Astronaut's Favorite Key on the Keyboard due to the fact that an Astronaut often travel to Space and work on satellites and as such they loves the space bar, more as it tells more about  the Outer Space.

Learn more about astronaut from

https://brainly.com/question/24496270

Edhesive 3.7 code practice

Answers

Yes that answer is correct 3.7

Answer: To hard to answer :)

Explanation: hurts my brain


The type of Al that computers can use to generate and understand human speech is called__________
processing

Answers

Answer:

Language or Vocal processing

Explanation:

Language processing in AI is used to understand languages, dialects and phrases, these AI have been trained to understand human language.

what is this car first to awnser is the brianliest

Answers

Answer: Lamborghini

Explanation: Is it yours

Lamborghini ?????????????

Implement the above in c++, you will write a test program named create_and_test_hash.cc . Your programs should run from the terminal like so:
./create_and_test_hash should be "quadratic" for quadratic probing, "linear" for linear probing, and "double" for double hashing. For example, you can write on the terminal:
./create_and_test_hash words.txt query_words.txt quadratic You can use the provided makefile in order to compile and test your code. Resources have been posted on how to use makefiles. For double hashing, the format will be slightly different, namely as follows:
./create_and_test_hash words.txt query_words.txt double The R value should be used in your implementation of the double hashing technique discussed in class and described in the textbook: hash2 (x) = R – (x mod R). Q1. Part 1 (15 points) Modify the code provided, for quadratic and linear probing and test create_and_test_hash. Do NOT write any functionality inside the main() function within create_and_test_hash.cc. Write all functionality inside the testWrapperFunction() within that file. We will be using our own main, directly calling testWrapperFunction().This wrapper function is passed all the command line arguments as you would normally have in a main. You will print the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 2 (20 points) Write code to implement double_hashing.h, and test using create_and_test_hash. This will be a variation on quadratic probing. The difference will lie in the function FindPos(), that has to now provide probes using a different strategy. As the second hash function, use the one discussed in class and found in the textbook hash2 (x) = R – (x mod R). We will test your code with our own R values. Further, please specify which R values you used for testing your program inside your README. Remember to NOT have any functionality inside the main() of create_and_test_hash.cc
You will print the current R value, the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 3 (35 points) Now you are ready to implement a spell checker by using a linear or quadratic or double hashing algorithm. Given a document, your program should output all of the correctly spelled words, labeled as such, and all of the misspelled words. For each misspelled word you should provide a list of candidate corrections from the dictionary, that can be formed by applying one of the following rules to the misspelled word: a) Adding one character in any possible position b) Removing one character from the word c) Swapping adjacent characters in the word Your program should run as follows: ./spell_check
You will be provided with a small document named document1_short.txt, document_1.txt, and a dictionary file with approximately 100k words named wordsEN.txt. As an example, your spell checker should correct the following mistakes. comlete -> complete (case a) deciasion -> decision (case b) lwa -> law (case c)
Correct any word that does not exist in the dictionary file provided, (even if it is correct in the English language). Some hints: 1. Note that the dictionary we provide is a subset of the actual English dictionary, as long as your spell check is logical you will get the grade. For instance, the letter "i" is not in the dictionary and the correction could be "in", "if" or even "hi". This is an acceptable output. 2. Also, if "Editor’s" is corrected to "editors" that is ok. (case B, remove character) 3. We suggest all punctuation at the beginning and end be removed and for all words convert the letters to lower case (for e.g. Hello! is replaced with hello, before the spell checking itself).
Do NOT write any functionality inside the main() function within spell_check.cc. Write all functionality inside the testSpellingWrapper() within that file. We will be using our own main, directly calling testSpellingWrapper(). This wrapper function is passed all the command line arguments as you would normally have in a main

Answers

This question is way to long I don’t even understand what your asking

Sum of Primes JAVA project
read 2 strings from the command line; each string will contain an integer. let's call those integers, num1 and num2. write a loop that goes from num1 and num2 looking for prime numbers. if a number if prime then store it in an array of integers, pass this array to a method that returns the sum of all the numbers in the array; you will also need to tell this method how many numbers are in the array. output only the sum of primes. you may assume a maximum of not more than 1000 numbers in the array.
*CODE*
import java.util.*;
class SumPrimes {
// go thru the array primes which has size elements
// total the integer values in primes
// return this total
// the first argument is the array of prime numbers
// the second argument is the number of primes in this array
public static int sumArray(first argument, second argument) {
}
// this method takes an integer, n, and determines if it is prime
// returns true if it is and false if it isn't
// a number is prime if it is only evenly divisible by 1 and itself
// 1 is NOT considered prime
static boolean isPrime(int n) {
// Corner case
if (n <= 1)
return false;
// Check from 2 to n-1
for (int i = 2; i < n; i++)
if (n % i == 0)
return false;
return true;
}
public static void main(String[] args) {
// define the constant MAX which represents the largest size of the primes array
int num1, num2, numPrime = 0;
// declare an array of the proper data type and size
// convert 1st command line argument from a string to an integer
num1 = Integer.parseInt(args[0]);
// get num2 from the command line
// loop through all integers from num1 to num2
// store those that are prime in the primes array
// keep track of the number of primes - numPrime
// output the sum of all the primes
System.out.println(sumArray(primes, numPrime));
}
}

Answers

Answer:

Explanation:

The following code is written in Java and creates the necessary code so that two int inputs are read and looped through all the numbers between them to find all the primes. These primes are counted and summed. Finally, printing out the sum and the number of primes found to the console.

import java.util.ArrayList;

import java.util.Scanner;

class SumPrimes{

   public static void main(final String[] args) {

       Scanner in = new Scanner(System.in);

           ArrayList<Integer> primes = new ArrayList<>();

           int num1, num2, numPrime = 0;

           System.out.println("Enter number 1:");

           num1 = in.nextInt();

           System.out.println("Enter number 2:");

           num2 = in.nextInt();

           for (int x = num1; x <= num2; x++) {

               if (isPrime(x) == true) {

                   primes.add(x);

                   numPrime += 1;

               }

           }

           System.out.println("There are " + numPrime + " primes in the array.");

       System.out.println("Their sum is " + sumArray(primes));

}

   public static int sumArray(ArrayList<Integer> arr) {

       int sum = 0;

       for (int x: arr) {

           sum += x;

       }

       return sum;

   }

   static boolean isPrime(int n) {

       if (n <= 1)

           return false;

       for (int i = 2; i < n; i++)

           if (n % i == 0)

               return false;

       return true;

   }

}

a predecessor of a work processor is​

Answers

Answer: Printing of documents was initially accomplished using IBM Selectric typewriters modified for ASCII-character input. These were later replaced by application-specific daisy wheel printers, first developed by Diablo, which became a Xerox company, and later by Qume.

Explanation:

In Scheme, source code is data. Every non-atomic expression is written as a Scheme list, so we can write procedures that manipulate other programs just as we write procedures that manipulate lists.
Rewriting programs can be useful: we can write an interpreter that only handles a small core of the language, and then write a procedure that converts other special forms into the core language before a program is passed to the interpreter.
For example, the let special form is equivalent to a call expression that begins with a lambda expression. Both create a new frame extending the current environment and evaluate a body within that new environment. Feel free to revisit Problem 15 as a refresher on how the let form works.
(let ((a 1) (b 2)) (+ a b))
;; Is equivalent to:
((lambda (a b) (+ a b)) 1 2)
These expressions can be represented by the following diagrams:
Let Lambda
let lambda
Use this rule to implement a procedure called let-to-lambda that rewrites all let special forms into lambda expressions. If we quote a let expression and pass it into this procedure, an equivalent lambda expression should be returned: pass it into this procedure:
scm> (let-to-lambda '(let ((a 1) (b 2)) (+ a b)))
((lambda (a b) (+ a b)) 1 2)
scm> (let-to-lambda '(let ((a 1)) (let ((b a)) b)))
((lambda (a) ((lambda (b) b) a)) 1)
In order to handle all programs, let-to-lambda must be aware of Scheme syntax. Since Scheme expressions are recursively nested, let-to-lambda must also be recursive. In fact, the structure of let-to-lambda is somewhat similar to that of scheme_eval--but in Scheme! As a reminder, atoms include numbers, booleans, nil, and symbols. You do not need to consider code that contains quasiquotation for this problem.
(define (let-to-lambda expr)
(cond ((atom? expr) )
((quoted? expr) )
((lambda? expr) )
((define? expr) )
((let? expr) )
(else )))
CODE:
; Returns a function that checks if an expression is the special form FORM
(define (check-special form)
(lambda (expr) (equal? form (car expr))))
(define lambda? (check-special 'lambda))
(define define? (check-special 'define))
(define quoted? (check-special 'quote))
(define let? (check-special 'let))
;; Converts all let special forms in EXPR into equivalent forms using lambda
(define (let-to-lambda expr)
(cond ((atom? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((quoted? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((or (lambda? expr)
(define? expr))
(let ((form (car expr))
(params (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
((let? expr)
(let ((values (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
(else
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)))

Answers

What are you saying at the bottom?

A disciplined, creative, and effective approach to problem solving is needed for project success. The nine-step approach to problem solving begins with develop a problem statement and the ninth step is determine if the problem has been solved. Which of the steps listed in not a step on the nine-step approach?
A. Gather data and verify the most likely causes.
B. Determine the most popular solution.
C. Revise the project plan.
D. Evaluate the alternative solutions.

Answers

Answer: Determine the most popular solution.

Explanation:

Some of the approaches to problem solving that are listed here include:

• Gather data and verify the most likely causes.

• Revise the project plan.

• Evaluate the alternative solutions

To solve a problem, one needs to gather the data and verify the likely causes of the problem. This can be done by asking questions, running test, interviewing people, running tests, reading reports, or analyzing data.

The project plan can also be revised. Likewise, when one comes with different solutions, one should weigh the cost and benefits of each in order to choose the best solution.

Determine the most popular solution isn't a correct option.

You are on a team of developers writing a new teacher tool. The students names are stored in a 2D array called “seatingChart”. As part of the tool, a teacher can enter a list of names and the tool well return the number of students in the class found with names that matching provided list. For this problem you will be completing the ClassRoom class in the problem below. Your job is to complete the numberOfStudents found method. This method accepts an array of Strings that contain names and returns the quantity of students with those names. For example:
Assume that a ClassRoom object named “computerScience” has been constructed and the seating chart contains the following names:


“Clarence”, “Florence”, “Ora”


“Bessie”, “Mabel”, “Milton”


“Ora”, “Cornelius”, “Adam”


When the following code executes:


String[] names = {"Clarence", "Ora", "Mr. Underwood"};

int namesFound = computerScience.numberOfStudents(names);

The contents of namesFound is 3 because Clarence is found once, Ora is found twice, and Mr. Underwood is not found at all. The total found would be 3.


Complete the numberOfStudents method

public class ClassRoom

{


private String[][] seatingChart;


//initializes the ClassRoom field seatingChart

public ClassRoom(String[][] s){

seatingChart = s;

}



//Precondition: the array of names will contain at least 1 name that may or may not be in the list

// the seating chart will be populated

//Postcondition: the method returns the number of names found in the seating chart



//TODO: Write the numberOfStudents method


public int numberOfStudents(String[] names){





}


public static void main(String[] args)

{

//DO NOT ENTER CODE HERE

//CHECK THE ACTUAL COLUMN FOR YOUR OUTPUT

System.out.println("Look in the Actual Column to see your results");

}

}

Answers

Answer:

Wait what? Some of the words are mashed together...

What year did the first hovercraft sail on water

Answers

1959!!!!!!!!!!!!!aksksid

PYTHON:
Defining a Figure of Merit
Consider a string-matching figure of merit. That is, it tells you how close to a given string another string is. Each matching letter in the same spot is worth one point. Only letters need be considered.
For instance, if the secret string reads 'BLACKBEARD', then 'BEACKBEARD' is worth 9 points, 'WHITEBEARD' is worth 5 points, 'BEARDBLACK' is worth 4 points, and 'CALICOJACK' is worth 1 point.
Compose a function pirate which accepts a string of characters guess and returns the number of characters which match the secret string 'BLACKBEARD'. It should be case-insensitive; that is, you should convert input to upper-case letters. It should return zero for strings which are not ten characters in length.
Your submission should include a function pirate( guess ) which returns a float or int representing the number of matching characters. (You should provide the secret string 'BLACKBEARD' inside the function, not outside of it.)
strings should not have same lengths

Answers

Answer:

figure of merit is a quantity used to characterize the performance of a device, system or method, relative to its alternatives. In engineering, figures of merit are often defined for particular materials or devices in order to determine their relative utility for an application.

Following are the Python program to find the string-matching figure:

Python Program:

def pirate(g):#defining the method pirate that takes one variable in parameter

 if len(g)!= 10:#defining if block that check the parameter length value that is not equal to 10

   return 0   #using the return keyword that return a value that is 0

 else:#defining else block

   g= g.upper()#defining g variable that converts the parameter value into upper value

   secretString = "BLACKBEARD"#defining string variable secretString that holds string value

   c = 0#defining integer variable c that holds integer value

 for i in range(0, len(g)):#defining loop that counts and check value is in string variable

   if g[i] == secretString[i]:#defining if block that checks value in secretString variable

     c += 1; #defining c variable that increments its value

   return c;#using return keyword that return c value

print(pirate("BEACKBEARD"))#using print method that calls pirate method and prints its value

print(pirate("WHITEBEARD"))#using print method that calls pirate method and prints its value

print(pirate("BEARDBLACK"))#using print method that calls pirate method and prints its value

print(pirate("CALICOJACK"))#using print method that calls pirate method and prints its value

Output:

Please find the attached file.

Program Explanation:

Defining the method "pirate" that takes one variable "g" in parameter.Inside the method an if block that checks the parameter length value that is not equal to 10, and uses the return keyword that returns a value that is 0In the else block, define the "g" variable that converts the parameter value into the upper value, and use a string variable "secretString" that holds the string value. In the next step, define an integer variable "c" that holds an integer value, and define a loop that counts and checks the value in a string variable.Inside this, define if block that checks the value in the "secretString" variable, increments the "c" value, and returns the "c" value.Outside the method, a print method that calls the "pirate" method prints its value.

Find out more about the string-matching here:

brainly.com/question/16717135

What steps can be used to open the Custom AutoFilter dialog box? Select any cell in the data range.

Click the _____ tab.

In the ______ group, click Filter.

Next to a column heading, click the AutoFilter drop-down arrow.

Click ______ and click Custom Filter. The Custom AutoFilter dialog box appears for creating custom filers.

Answers

Answer:

Data

Sort and Filter

Text Filters

Explanation:

Proof that this answer is correct in the file attached.

A step which can be used to open the Custom AutoFilter dialog box is to click on the data tab.

What is data?

Data simply refers to a representation of factual instructions (information) in a formalized manner, especially as a series of binary digits (bits) that are used on computer systems.

The step which can be used to open the Custom AutoFilter dialog box on Microsoft Excel include the following:

Click on the data tab.In the Sort & Filter group, click Filter.Next to a column heading, click the AutoFilter drop-down arrow.Click Text Filters and click Custom Filter.Then, the Custom AutoFilter dialog box would appear for creating custom filers.

Read more on Excel spreadsheets here: https://brainly.com/question/4965119

#SPJ2

If the pictures are not the same size when they are selected from a file,

PowerPoint will use AutoCorrect so they are the same size.
the picture will be overcorrected.
these pictures will remain the size as in the file.
the layout should be fit to the slide.

Answers

Answer:

The correct answer is C) the pictures will remain the size as in the file

Explanation:

Microsoft Office PowerPoint is a multi-media presentation tool. It supports, videos, pictures, and hyperlinks.

When a picture is inserted by selection from a file, PowerPoint does not automatically resize. The editor or user will need to manually adjust the size(s) of the picture(s) to fit the dimensions they require.

Cheers

 

Other Questions
An example of good peer pressure would include A condition of the treaties with American Indian tribes was that tribes would haveO the ability to work the settlers' land for food.O sixty thousand dollars per acre for land they lost.O resources and services they might needO the right to continue fishing and hunting all lands freely.Mark this and returnSave and ExitNelmSubmit 2. Existe una sola medida eficaz para cortar la ruta de transmisin del virus en diferentes espacios? Please helpAccording to the section "The Mountain Ranges of Europe and Asia," what are the natural barriers between Europe and Asia? A counselor plans transportation for 120 students for a field trip using buses and vans. Exactly 120 students can fit in 2 buses and 2 vans.Exactly 120 students can also fit in 1 bus and 6 vans..Which statement is true? -4x+3x Marshall Welding Company has two service departments (Cafeteria and Human Resources) and two production departments (Machining and Assembly). The number of employees in each department follows. Cafeteria 20 Human Resources 30 Machining 100 Assembly 150 Marshall Welding uses the step-down method of cost allocation and allocates cost on the basis of employees. Human Resources cost amounts to $1,200,000, and the department provides more service to the firm than Cafeteria. How much Human Resources cost would be allocated to Cafeteria have some points! :3 What is the answer to these questions?5678 Describe any political positions Melvin E. Thompson held after the controversy. Where did the CORE route and the SNCC route meet?PLEASE HELP ME ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP Plssssssss hellllllpppppppppppp MamaHuevos ( Click on the photo to see fully)How does this create two congruent right angle triangles when i thought it had to be similar in 3 ways to be congruent Quadrilateral WILDWILDW, I, L, D is inscribed in circle OOO. \overline{WI} WI start overline, W, I, end overline is a diameter of circle OOO. What is the measure of \angle DDangle, D? Correct the following sentences.1. the dog was chasing a rabbit 2. Can i please have one more chance to win the game 3. Jane run to the store this morning.4. Mr. owen is our principal.5. Sometimes I like to ride my motorcycle whe the sun is shined. What is the amplitude of the function?2.O3O45 how do canada immigration policies reflect our underlying values and impact our canadian identity? Victor sold cupcakes and cookies yesterday. Each cupcake sold for $2.25 and each cookie sold for $0.50. At the end of theday, Victor had sold $95.25 worth of cookies and cupcakes. If he sold 68 cupcakes and cookies combined, how manycupcakes were sold and how many cookies were sold? **show your work please