wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Microsoft powerpoint presentation

profile
Shubham Koyande
Aug 28, 2022
0 Likes
0 Discussions
185 Reads

Microsoft powerpoint is a presentation program, created by Robert Gaskins and Dennis Austin at a software company named Forethought, Inc. It was released on April 20, 1987, initially for Macintosh computers only.Microsoft acquired PowerPoint for about $14 million three months after it appeared. This was Microsoft's first significant acquisition,and Microsoft set up a new business unit for PowerPoint in Silicon Valley where Forethought had been located

The list of the languages used are Dutch, English, Estonian, Filipino, Finnish, French, Galician, Georgian, German, Greek, Gujarati, Hausa, Hebrew, Hindi, Hungarian, Icelandic, Igbo, Indonesian, Irish, isiXhosa, isiZulu, Italian, Spanish, Kannada, Kazakh, Khmer, Kinyarwanda, Kiswahili, Konkani, Korean, Kyrgyz, Latvian, Lithuanian, Luxembourgish, Macedonian, Malay , Malayalam, Maltese, Maori, Marathi, Mongolian , Nepali, Norwegian , Norwegian, Odia, Pashto, Persian , Polish, Portuguese , Portuguese , Punjabi, Quechua, Romanian, Romansh, Russian, Scottish Gaelic, Serbian, Serbian , Serbian, Sesotho sa Leboa, Setswana, Sindhi, Sinhala, Slovak, Slovenian, Spanish, Swedish, Tamil, Tatar , Telugu, Thai, Turkish, Turkmen, Ukrainian


Comments ()


Sign in

Read Next

RAID and It's Levels

Blog banner

Big O Notation

Blog banner

RAID

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Zoho

Blog banner

Virtual memory

Blog banner

Deadlock and Starvation

Blog banner

Danger assessment in GIS

Blog banner

Security in Operating Systems

Blog banner

OPERATING SYSTEM

Blog banner

Disk cache

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Deadlock and Starvation

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Memory management

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Sage

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

LTE Technology

Blog banner

What is a Malware ?

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Sagar Parikrama

Blog banner

Disk scheduling

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

What are Tenders its various types

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Operating Systems Overview

Blog banner

Clustering Techniques

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

PERSONAL STORIES

Blog banner

Modern Operating Systems

Blog banner

"Audit" In Data Science

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Risk mitigation and management

Blog banner

Memory Management

Blog banner