1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
14

Gwen has a photo she'd like to display in her speech, but she forgot to digitize it. She only has a hard copy, and she doesn't h

ave time to scan it before her speech. Which type of visual media in the classroom would be helpful to Gwen in this situation?a. traditional whiteboardb. overhead projectorc. flip chartsd. document camera
Computers and Technology
1 answer:
irina1246 [14]3 years ago
8 0

Answer:

Option(d) i.e "document camera " is the correct answer for the given question  

Explanation:

The document camera is mainly preferable when our aim displays the object into a large audience with the help of document camera  Gwen displays her speech into the classroom.

The hard copy is simply placed in the document camera, it takes the hard copy as an image format and gives the live image of the speech with the help of a monitor .

  • The main advantage of a document camera is that they provide greater flexibility.
  • Traditional whiteboard, overhead projector, flip charts not the best solution for that problem also they do not provide flexibility so they are all incorrect options.

You might be interested in
You are the administrator for a small network. You have approximately 50 users who are served by a single Windows server. You ar
Paladinen [302]

Answer:

Rename the existing account, and change the name fields to match the new employee.

Explanation:

As you appoint new employer that need all the access to everything that the previous user had, including the documents files held in the Home Folder.

So, As an administrative of the network, you should Rename the existing account, and change the name fields to match the new employee.

4 0
3 years ago
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
If you inadvertently delete a file, you may be able to retrieve it from the A. Drop Box. B. System Restore. C. Restore File. D.
Natalka [10]
D- Recycle Bin is the answer
6 0
3 years ago
Why does your e-learning course need a title slide?
aev [14]

Answer:

You've probably noticed that many e-learning courses start with a title slide. ... Your title slide is important because it's the first impression users get of your course—and learners do judge e-learning courses within moments of launching them! So take the opportunity to captivate them with a great-looking title slide.

5 0
3 years ago
Read 2 more answers
Your friend is an intern at the local Department of Health and needs to prepare a report about the recent activity of the influe
Butoxors [25]

Answer:

#include<bits/stdc++.h>

using namespace std;

int main(){

  // Defining Variables

  int no_of_weeks;

  int total_cases = 0;

  //Declaring Vector of Pair of Integer and string

  std::vector<pair<int,string>> data;

  // Taking Input for the Number of Weeks

  cout<<"Enter No. of Weeks\n";

  cin >> no_of_weeks;

  // Running the Loop for no_of_weeks times

  for(int i = 0; i < no_of_weeks ; i++){

      int A,B,C;

      // Taking Input for different types of flus

      cout<<"Enter No. of Cases of Flu A, B, C for week" << i + 1 << " seperated by space : \n";

      cin >> A >> B >>C;

      // Adding all the cases in a week

      int cases_in_a_week = A + B + C;

      // Updating total cases

      total_cases += cases_in_a_week;

      // Declaring the level variable

      string level;

      // Updating the level of the week corresponding to each case

      if(cases_in_a_week < 500) level = "Low";

      else if(cases_in_a_week >= 500 && cases_in_a_week < 2000) level = "Moderate";

      else level = "Widespread";

      // Storing the Week's information by using a vector of pairs

      // in which pair's first is the number of cases which is of type int

      // while the second is the level of the flu which is of the type string

      data.push_back(make_pair(cases_in_a_week,level));

  }

  // Linking the stdoutput to the flu_report.txt file

  // this also creates the file with the same name if it doesn't exists

  freopen("flu_report.txt", "w", stdout);

  // Printing the respective output data with Bar Chart of stars for each level

  for(int i = 0;i < no_of_weeks ; i++){

      //printing the week no. and number of cases

      cout<<i+1<<" "<<data[i].first<<" "<<data[i].second<<" |";

      //calculating the number of stars

      int stars = data[i].first/250;

      //printing the stars of the bar chart

      for(int j = 0; j < stars ; j++) cout<<"*";

      cout<<endl;

  }

  //printing the total number of cases

  cout<<total_cases;

}

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is a key reason for assignning permissiongs when configuring file and share access?
    7·1 answer
  • What is an incremental backup?
    7·1 answer
  • What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
    8·1 answer
  • Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control
    11·1 answer
  • Convert 4.5 strides to girth
    10·1 answer
  • I NEED answers for these qu plz
    5·1 answer
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • Provide five signs of cyber bullying​
    15·2 answers
  • In this assignment, you will implement an online banking system. Users can sign-up with the system, log in to the system, change
    14·1 answer
  • What is e banking effects
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!