1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

When creating an electronic slide presentation, Eliza should ensure that her presentation contains

Computers and Technology
1 answer:
kondor19780726 [428]3 years ago
8 0

Answer: C) only one main idea on each slide.

Eliza needs to be able to use her electronic slide presentation to convey what the purpose of the presentation is. By providing one main idea on each slide, this would show the audience of Eliza exactly what she wants to convey to them. This would also help her audience get on board of what the whole idea of the presentation is.

You might be interested in
In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
allsm [11]

Answer:

WAN router security standard, Web services standard

Explanation:

Complete statement with blanks filled:

In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the WAN router security standard explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the Web services standard identifies which controls are vital for use of Web services provided by suppliers and external partnerships.

7 0
3 years ago
Who wrote the book of luke​
netineya [11]
Luke himself wrote t the book
5 0
3 years ago
Is data mining a simple transformation or application of technology developed from databases, statistics, machine learning, and
frozen [14]

Answer:

No.

Explanation:

Data mining is a process that involves extracting large data from a database to be used in data analytics. It is a tool in analytics for provision of wanted data.

It uses databases, statistics, machine learning and pattern recognition to extract, clean and cluster data based on data types classification. It involves integration of data rather than just a simple transformation.

7 0
3 years ago
Read 2 more answers
Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
blagie [28]

Answer:

  • Print(x) would be directly calling the x variable so it would print everything but the []
  • Print(x[10]) is calling the number 10 which results in E
  • 2 + d= 2d

3 0
3 years ago
Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts a
zvonat [6]

Answer:

<u> A. precomputes the most efficient route and uses it to ensure rapid packet delivery.</u>

Explanation:

In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.

For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.

7 0
3 years ago
Other questions:
  • Which one of the following features can control left and right indents using markers?
    5·2 answers
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
    8·1 answer
  • Which building-block feature is available in the Text grouping on the Insert tab?
    14·1 answer
  • Main characteristic of open source software<br> ?
    7·1 answer
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    5·1 answer
  • A ______ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of d
    5·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • After reviewing device security you learn that a malicious user in an airport
    14·1 answer
  • HELP TIMED!!!!!!!!!!!!!!!!!!!!
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!