CDMA stands for Code Division Multiple Access, which is a digital wireless communication technology. It uses the spread spectrum method to separate and differentiate data from different sources. This method separates the data by encoding it using a code, which allows multiple data streams to travel over the same frequency channel simultaneously.
The purpose of CDMA is to enable the transmission of different types of information, such as voice and data, over a shared frequency band. The first step in distinguishing the transmission of two CDMA users is to generate the user codes and to multiply each data bit with the corresponding code bits. Let’s start with User A. User A has a data bit sequence of 0 1 and a code sequence of 1 1 1 0 0 1 0 1. To create the user code for User A, we must multiply each bit of the code by the corresponding data bit. The resulting sequence is 0 1 0 0 0 1 0 1. Next, let’s generate the user code for User B. User B has a data bit sequence of 1 1 and a code sequence of 1 0 1 1 0 1 1 0.To create the user code for User B, we must multiply each bit of the code by the corresponding data bit. The resulting sequence is 1 0 1 1 0 1 1 0. Now that we have generated the user codes, we must sum the two codes to obtain the transmitted sequence.1 0 1 1 0 1 1 0 (User B’s code) + 0 1 0 0 0 1 0 1 (User A’s code) = 1 1 1 1 0 0 1 1This transmitted sequence is the sum of both user codes. It represents the transmission of both users on the same channel. CDMA enables the transmission of multiple data streams on the same frequency channel simultaneously. This is achieved by encoding the data using a code that is unique to each user. When two or more users transmit data on the same channel, their codes are summed to obtain the transmitted sequence. This enables the receiver to separate and decode the data from different sources.
To learn more about CDMA, visit:
https://brainly.com/question/32260030
#SPJ11
1. Assume Printers and Ink Cartridges are complements, show graphically what must be happening to the demand for Printers if, other things equal, the demand for Ink Cartridges is increasing. How about if the demand for Ink Cartridges is falling? (A complete answer would include explaining what is happening with Perinters, DPrinters, QDerinters, PInk Cartridges, Q Dink Cartridges, D ink Cartridges). 2. Assume Pepsi and Coke are substitutes; show graphically what happens to the demand for Coke if, other things equal, the price of Pepsi falls. How about if the price of Pepsi increases? (A complete answer would include explaining what is happening with Peepsi, DPepsi, QDepsi, PCoke, QDcoke, D Coke).
Graphically, if Printers and Ink Cartridges are complements and the demand for Ink Cartridges is increasing, it implies that the demand for Printers will also increase.
The relationship between the two can be represented by a rightward shift in the demand curve for Printers. This shift indicates an increase in the quantity demanded for Printers at each price level, leading to higher equilibrium prices (PPrinters) and quantities (QDPrinters) for Printers.
Conversely, if the demand for Ink Cartridges is falling, the demand for Printers will also decrease. In this case, the demand curve for Printers will shift leftward, indicating a decrease in the quantity demanded for Printers at each price level. This will result in lower equilibrium prices (PPrinters) and quantities (QDPrinters) for Printers.
To summarize, when Ink Cartridges are complements to Printers, an increase in the demand for Ink Cartridges leads to an increase in the demand for Printers, while a decrease in the demand for Ink Cartridges leads to a decrease in the demand for Printers.
Complementary goods are products that are consumed together, where the demand for one product affects the demand for the other. In this case, Printers and Ink Cartridges are complements, meaning they are typically used together. When the demand for Ink Cartridges increases, it indicates a higher desire or need for printing, which leads to an increased demand for Printers. This relationship can be visualized by a rightward shift in the demand curve for Printers.
The shift in the demand curve for Printers implies that at each price level, consumers are willing to buy more Printers, resulting in a higher equilibrium price (PPrinters) and quantity (QDPrinters) for Printers in the market. This shift occurs because as more people purchase Ink Cartridges, they require Printers to use them effectively, creating a higher demand for Printers.
Conversely, when the demand for Ink Cartridges falls, it suggests a decreased need or desire for printing, which in turn leads to a decrease in the demand for Printers. The demand curve for Printers shifts leftward, indicating that at each price level, consumers are willing to buy fewer Printers. As a result, the equilibrium price (PPrinters) and quantity (QDPrinters) for Printers in the market decrease.
In both cases, the change in demand for Ink Cartridges directly affects the demand for Printers due to their complementary nature. An increase or decrease in the demand for Ink Cartridges leads to a corresponding increase or decrease in the demand for Printers, respectively.
Learn more about Printers here:
https://brainly.com/question/5039703
#SPJ11
In what situations might you need to use a function that calls another function?
Answer:
Explanation:
It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.
are digital contract services that require senstive information safe?
Answer:
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.
This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. Given the cost of a security breach—losing your customers’ trust and perhaps even defending yourself against a lawsuit—safeguarding personal information is just plain good business.
Some businesses may have the expertise in-house to implement an appropriate plan. Others may find it helpful to hire a contractor. Regardless of the size—or nature—of your business, the principles in this brochure will go a long way toward helping you keep data secure.
help with this please anyone
Keywords:
-Virus
-Spyware
-Worm
-Trojan Horse
Definitions:
-This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
-This type of malware can copy itself hundreds of times so can hard your device very quickly.
-A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
-A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
PLZ ANYONE HELP ME
Answer:
trojan horse
worm
virus
spyware
Explanation:
gimme the brainliest hehe
Answer:
1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.
4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
Explanation:
Pls give another person brainliest...
thanks hope it helps
antivirus software is a windows utility that is unnecessary as long as you are careful browsing the internet.
Antivirus software is a crucial Windows utility that provides essential protection even if you are careful while browsing the internet.
Antivirus software plays a critical role in safeguarding computer systems against various online threats, including viruses, malware, ransomware, and phishing attacks. While it is important to exercise caution while browsing the internet, relying solely on careful browsing is not sufficient to ensure complete protection.
The internet is a vast and dynamic environment where new threats emerge constantly. Even with the best intentions, it is easy to encounter malicious websites, infected files, or deceptive emails that can pose significant risks to your computer and personal information. Careful browsing alone cannot guarantee protection against all possible threats.
Antivirus software provides real-time scanning, threat detection, and removal capabilities, helping to identify and eliminate malicious software before it can cause harm. It offers proactive defense mechanisms, such as behavior analysis and heuristic scanning, to detect unknown or zero-day threats that may evade traditional security measures.
Learn more about Antivirus software
brainly.com/question/23845318
#SPJ11
The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?
In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.
1. Server providing data storage will possess database applications.
2. Print server will have applications to provide print capability.
The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.
The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.
Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
As important as it is to plan ahead, sometimes you _____. A. Need to throw all the rules of the road out the window B. Can't stop things from going wrong C. Have a higher priority than driving safely D. Will regret having made plans
Answer:
B
Explanation:
This seems the most appropriate..
PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS
A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:
Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50
Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.
It's pretty hard but I think it is 1,350
Darren is hoping to get search results that begin with the words "art history." Which of the following search terms will help
him?
A. art history
C. lart history
B. "art history"
D. -art history-
Answer: B
Explanation: In order to get specific results in answers it is best to put quotes around it
Question 1 of 10
Which step happens first after a switch receives a message that includes a
MAC address?
OA. The switch receives a reply from the message's receiving device.
B. The switch sends the message to a random device on the
network.
OC. The switch looks up the receiving device's MAC address in a
switching table.
OD. The switch forwards the message to the port of the receiving
device.
SUBMIT
The step that happens first after a switch receives a message that includes a MAC address is that "The switch looks up the receiving device's MAC address in a switching table." (Option C)
What is a MAC Address?
A media access control (MAC) address is a one-of-a-kind identifier assigned to a network interface controller for use as a network address in intra-network communications. This is a widespread use in most IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth.
What is a switch?
A network switch is a piece of networking gear that links devices on a computer network by receiving and forwarding data to the target device using packet switching.
Learn more about MAC Addresses:
https://brainly.com/question/24812654
#SPJ1
_____ is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen
Answer:
form filling
Explanation:
form filling is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen
u can use quizlet for this or any thing
What is the ascii code for the letter D
Answer:
068
Explanation:
Or if you want binary it's 01000100
Which of the following Excel Weyboard shortcuts could be used to find how many rows of data you have in a worksheet assuming you have no empty cows in your datas Select all that apply. E CTRL Home CALUD CHILD
The Excel keyboard shortcuts that could be used to find how many rows of data you have in a worksheet assuming you have no empty rows in your data are CTRL + Home and CALUD.
CTRL + Home takes you to the very beginning of the worksheet, which is cell A1. From there, you can press the down arrow key to scroll down to the last row of data. The row number of the last row of data will be displayed in the row header.
CALUD (Control + Shift + End) selects all cells from the current cell to the last non-empty cell of the worksheet. This means that if you have data up to row 100, for example, and the last row is empty, CALUD will only select cells up to row 100. To find the total number of rows with data, you can check the status bar at the bottom of the Excel window. The status bar displays various information about the selected cells, including the number of rows and columns.
It's worth noting that the shortcut CHILD (Control + Shift + 8) is not relevant to this task. This shortcut displays or hides the outline symbols for the selected cells, which can be useful when working with large datasets and grouping data.
I understand that you want to know about Excel keyboard shortcuts to find the number of rows of data in a worksheet, assuming there are no empty cells in the data. Please note that some terms you mentioned are irrelevant or contain typos. However, I will provide you with a relevant answer.
You can use the following Excel keyboard shortcuts to determine the number of rows of data in your worksheet:
1. Ctrl + arrow keys: This shortcut helps you navigate through your data quickly. To find the number of rows, place your cursor in the first cell of the data (A1, for example) and press Ctrl + Down Arrow. This will take you to the last row with data. You can then look at the row number displayed in the bottom-left corner of the Excel window or on the row header.
2. Ctrl + End: This shortcut moves your cursor to the last cell with data in your worksheet. After using this shortcut, you can check the row number in the bottom-left corner or on the row header to determine the number of rows with data.
Please note that these shortcuts assume you have no empty cells within your data. If there are any empty cells, you might need to use Excel functions like COUNT or COUNTA to accurately count the number of rows with data.
To know more about e worksheet visit:
https://brainly.com/question/29073657
#SPJ11
You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.
The virtual disk configuration for the VMs on both servers in this environment is shown below.
In the Hyper V Test,
Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,
What is virtual disks?Setting up 5 virtual disks, each 50 GB in size.
2 VMs each have a 50 GB virtual drive assigned to them.
The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.
To learn more about virtual disks refer to:
https://brainly.com/question/28851994
#SPJ1
Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.
What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.Therefore,
Configuration:
Creating 5 Virtual disks of 50 GB each.
1 virtual disk of 50 GB is assigned to 2 VM.
The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.
For Hyper V App,
Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.
Configuration:
Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.
Since only two VMs are run here, the disk space can be separated.
To learn more about Hyper V Test, refer to:
https://brainly.com/question/14005847
#SPJ1
Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?
for
else
else-if
while
Answer: D
Explanation:
Answer:
im pretty sure its for
Explanation:
The best way to handle a problem is to ______.
a.
wait for someone to notice the problem
b.
avoid the problem so you don’t get blamed
c.
take care of the problem as soon as someone asks you
d.
take care of the problem as soon as you notice it
Answer:
D. take care of the problem ad soon as you notice it
What makes these Pokémon special?
-Charizard
-Blastoise
-Charmander
-Ivysaur
-Missingno
First one to get it right gets Brainliest! If you get it right in the comments, I'll thank you on your profile!
Answer:
Charizard is a fire type dragon that is orange Blastoise is a big turtle that's water type Charmander is a fire type dinosaur the first evolution of Charizard Ivysaur is a grass type Turtle looking thing and the last one is a glitch
Answer:
i believe they are all based off of real amphibians and reptiles.
Explanation:
i really need brainliest if i got it wrong give me another try. i named my chameleon charmander so i really do love pokemon this is just such a specific question.
a table with a single-field primary key is usually in compliance with what normal form?
A table with a single-field primary key is usually in compliance with the first normal form (1NF).
The first normal form requires that the table must have a primary key, and every column in the table must contain atomic values (values that cannot be divided into smaller pieces). A single-field primary key ensures that each record in the table can be uniquely identified, which is a requirement for complying with 1NF. It is important to note that compliance with 1NF is the first step in ensuring data integrity and avoiding data redundancy. When tables are in 1NF, it becomes easier to perform data manipulations, queries, and other operations on the data. Therefore, it is essential to ensure that tables are in 1NF before proceeding to higher normal forms.
To know more about normal form (1NF) visit:
https://brainly.com/question/31453057
#SPJ11
Write the way/steps to play and save the recorded sound with the sound recorder software in you PC/Laptop.
To play and save recorded sound using the sound recorder software on your PC/Laptop, follow these steps:
1. Open the sound recorder software on your PC/Laptop. The exact method may vary depending on the operating system you are using.2. Ensure that your microphone or recording device is properly connected to your computer.3. Click on the "Record" or "Start Recording" button within the sound recorder software to begin recording.4. Speak or make the desired sound into the microphone or recording device. The sound recorder software will capture and record the audio.5. When you are finished recording, click on the "Stop" or "Finish" button within the sound recorder software to stop the recording.6. To play back the recorded sound, locate the recorded file within the sound recorder software. It is usually saved in a default folder or the location specified by you during the recording process.7. Double-click on the recorded file to play it using the sound recorder software. The software should have playback controls such as play, pause, and stop.8. If you are satisfied with the recorded sound, you can save it by selecting the "Save" or "Save As" option within the sound recorder software. Choose a location on your computer where you want to save the file, provide a name, and select the desired file format (e.g., MP3, WAV).9. After specifying the save location and file name, click on the "Save" button to save the recorded sound to your computer.10. Once saved, you can access and play the recorded sound file from the location you saved it on your PC/Laptop whenever desired.Please note that the steps provided above are general guidelines, and the specific steps and options may vary depending on the sound recorder software and operating system you are using.
\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)
♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)
Write 2-4 short & energetic sentences to interest the reader! Mention your role, experience & most importantly - your biggest achievements, best qualities and skills about data entry.
Searching for an information section genius? Look no further! With north of 5 years of involvement and a 99.9% precision rate, I'm the ideal possibility for your information passage needs. My scrupulousness, speed, and proficiency will guarantee that your information is precisely and productively entered, like clockwork. We should cooperate to make your information passage calm!
Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap
which of the following information technology career fields generally requires the lowest level of education for an entry level position?
Answer:
C
Explanation:
Which visual novels do you recommend and why?
Answer:
I rec recommend Fate/Stay Night. It's honestly so good!
Explanation:
PLS HELP MEHHHHHHHHHHHHHHHHHHH
Tyra used the software development life cycle to create a new game. She released it to her friends in order to get feedback.
Which stage of the software development life cycle is Tyra currently in?
a
Coding
b
Design
c
Planning
d
Testing
Answer:
D.) Testing
Explanation:
Tyra developed a new game and let her friends try it. This means she already made it planned, designed, and coded the game. now her friends are testing it.
I hope this helps you :)
-KeairaDickson
Do any of you guys know what the main problem in E.T is?
Answer:
At its glowing red heart, E.T. is a film about friendship. Elliott and E.T. are a tightknit pair from wildly different backgrounds, and their bond is grounded in love, loyalty, compassion, teamwork, and even a mysterious cosmic connection.
True or false? Software application packages function as the interface between the operating system and firmware
The statement "Software application packages function as the interface between the operating system and firmware" is FALSE. Here's why:Software application packages are software programs that perform particular tasks. They are designed to assist users in executing tasks related to a specific purpose.
They are programs that run on top of the operating system of a computer. They can be used in conjunction with the operating system to perform various tasks such as running utilities, designing images, and creating documents, among other things.The operating system, on the other hand, is a critical software component of a computer system that allows other software applications to communicate with hardware.
It is the interface between the user and the hardware of a computer system. The operating system manages the computer's memory, input/output, and file systems, among other things.In terms of firmware, it is a type of software that is embedded in a hardware device.
Firmware is responsible for enabling the device to operate and providing instructions on how it should operate. An example of firmware is the software that powers a keyboard or a printer.To summarize, software application packages, operating systems, and firmware are all essential components of a computer system.
However, they are distinct software components with unique functionalities and roles in a computer system. So, the statement "Software application packages function as the interface between the operating system and firmware" is FALSE.
To know more about statement visit:
https://brainly.com/question/17238106
#SPJ11
which type of attack is wep extremely vulnerable to?
WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.
What is Initialization Vector?An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.
To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4
A computer system consists uses usernames with 6 symbols, where the allowable symbols are capital letters (A, B, . . ., Z) and digits (0, 1, . . . , 9). Don’t multiply out. Leave your answers in a form like 7! × 53 × 2.
(a) How many usernames are possible if repetition is not allowed?
(b) How many usernames allow repetition and use only letters?
(c) How many usernames are possible if the first three symbols must be different capital letters (i.e., no repeats), the last symbol must be a nonzero digit, and there are no other restrictions on the symbols?
The possible usernames if repetition is not allowed is 36⁶.
The usernames that allow repetition is 26⁶
The usernames possible if the first three symbols must be different is 15,600.
How to find possibilities?(a) There are 36 possible symbols for each of the 6 symbols, so there are 36⁶ possible usernames.
(b) There are 26 possible letters for each of the 6 symbols, so there are 26⁶ possible usernames.
(c) There are 26 possible letters for the first symbol, 25 possible letters for the second symbol, and 24 possible letters for the third symbol. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 = 15,600 possible usernames.
The first three symbols must be different capital letters. There are 26 possible capital letters for the first symbol, 25 possible capital letters for the second symbol, and 24 possible capital letters for the third symbol. So there are 26 × 25 × 24 possible combinations for the first three symbols.
The last symbol must be a nonzero digit. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 possible usernames.
Find out more on computer system here: https://brainly.com/question/30146762
#SPJ4
problem 7 network address address class default subnet mask custom subnet mask total number of subnets total number of host addresses number of usable addresses number of bits borrowed 10.0.0.0 /16 what is the 11th subnet range? what is the subnet number for the 6th subnet? what is the subnet broadcast address for the 2nd subnet? what are the assignable addresses for the 9th subnet?
The 11th subnet range is = 10.10.0.0 to 10.10.255.255
The broadcast address of the 2nd subnet will be = 10.1.255.255
The assignable address range for the 9th subnet will be = 10.8.0.1 to 10.8.255.254
5 is the subnet number for the 6th subnet
Each device has an IP address made up of two parts: the client, also known as the host address, and the server, also known as the network address. A DHCP server or a user must manually configure IP addresses (static IP addresses). The subnet mask divides the IP address into host and network addresses, designating which portion of the address belongs to the device and which to the network. A gateway, also known as the default gateway, joins local devices to other networks. As a result, whenever a local device wants to send data to a device with an IP address on a different network, the gateway receives the packets first and then passes them on to the intended recipient outside of the local network.
Learn mor about Subnet here:
https://brainly.com/question/15055849
#SPJ4
What are the steps to customize a slide show?
Go to Slide Show tab, select Hide Slide, select the slides to hide, and save.
Go to Slide Show tab, select Set Up Slide Show, select show type Custom, and save.
Go to Slide Show tab, select Custom Slide Show, select slides to be shown, and save.
Go to Slide Show tab, select Custom Slide Show, select Record Slide Show, and save.
Answer: Third one
Explanation: I got it right
Answer:
Third one
Explanation: