1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
12

To keep your audience interested in your speech, you should provide them with as many details as possible about the topic.

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
4 0
The answer is False.  <span>To keep your audience interested in your speech, you should do the ff techniques : 
</span><span>1. Talk about something your audience is interested in
</span><span>2. Tell them why they should listen
</span><span>3. Don’t make it too easy or too hard
</span><span>4. “Change grabs attention”
</span><span>5. Tell stories
</span><span>6. Have frequent breaks
</span><span>7. Make it short</span>
You might be interested in
I really need help please help me
Alona [7]
Mathematics because it's is the science of number

Jdhdhrjrjrjfjjf
5 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
krok68 [10]

This type of infection is this a characteristic of a computer worm

For better understanding, lets explain what computer Worms means.

  • Computer Worm are commonly referred to as an independent program that often replicates or double itself by copying a fraction of itself onto another computer. They often exit in two forms. They are:

  1. Network Worm is a type of computer worm that replicates or copies different fraction of itself to computers linked together in known network.
  2. Host Worm is a type of computer worm that replicates or copies itself to another computer in a network and later on remove or deletes itself completely from the previous computer in which it was in.
  • Computer worm are capable of replicating themselves without human intervention.

Learn more about computer worm from

brainly.com/question/19631265

4 0
3 years ago
Write a program in python that can compare the unit (perlb) cost of sugar sold in packages with different weights and prices. Th
Dmitrij [34]

Answer:

weight1 = float(input("Enter the weight of first package: "))

price1 = float(input("Enter the price of first package: "))

weight2 = float(input("Enter the weight of second package: "))

price2 = float(input("Enter the price of second package: "))

if weight1 > 0 and price1 > 0 and weight2 > 0 and price2 > 0:

   unit_cost1 = price1 / weight1

   unit_cost2 = price2 / weight2

   

   if unit_cost1 < unit_cost2:

       print("Package 1 has a better price.")

   else:

       print("Package 2 has a better price.")

else:

   print("All the entered values must be positive!")

Explanation:

*The code is in Python.

Ask the user to enter the weight and the price of the packages

Check if the all the values are greater than 0. If they are, calculate the unit price of the packages, divide the prices by weights. Then, compare the unit prices. The package with a smaller unit price has a better price.

If all the entered values are not greater than 0, print a warning message

8 0
3 years ago
Paragraph on uses of computer 100 words plss​
Eva8 [605]

REFER TO ATTACHMENT・ᴥ・

8 0
3 years ago
Other questions:
  • Which statements about Excel's FV function are correct?
    13·1 answer
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)
    12·1 answer
  • Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
    9·1 answer
  • Can some one help me i do not now how to give a BRANLEST. if you help i will give you one BRANLEST.
    7·2 answers
  • Conduct research to determine the best network design to ensure security of internal access while retaining public website avail
    9·1 answer
  • From a database point of view, the collection of data becomes meaningful only when it reflect
    8·1 answer
  • Software that displays advertising material when online.
    12·2 answers
  • A web application's code prevents the output of any type of information when an error occurs during a request. The development t
    12·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
  • Define generation of computer ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!