1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
11

Keisha has been asked to give a presentation about a new method for processing customer returns. The first thing she should do i

s ________.
Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
4 0

Answer:

The first thing should Keisha does is determine the purpose of the presentation.

Explanation:

If we are giving any presentation then firstly we should determine the purpose of our presentation.

There are typical reasons for giving any presentation such as:

  • Alerting
  • Persuading
  • Inspiring
  • Enjoyable

By clearly defining the purpose you need to capture the attention of your audience and maintain their interest thoroughly across the oral presentation. Three key elements in any oral presentation process include:

  • Planning
  • Writing
  • Completion

You might be interested in
Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
pentagon [3]

Answer:

E. Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

Explanation:

The cisco ios is the operating system of any cisci network device. It is a command line interface used to configure these cisco devices.

The privilege user command "show running-config" in the command line interface is used to show the current configuration on the RAM of the router.

There are two ways to protect the router's console line with a password, with enable secret and enble password. The "enable secret" is a slightly encrypted password but the "enable password" has no encryption. These password methods are used to secure any channel to the router.

The "service password-encryption" command is used to encrypt all the passwords in the current configuration, to prevent attackers or unauthorized users from getting to the router.

7 0
3 years ago
Which is an advantage the electronic scheduling tools have over paper calenders?​
MA_775_DIABLO [31]

Answer:

The electronic scheduling tool can help you set an alarm as a reminder for different events, grouping them in other of dates, time, location and the concept of occasion if you need to pick anything along.

The paper calendar cannot do all this, just for you to check manually.

Explanation:

Electronic scheduling is fast, accurate and more organized, paper calendar is manual and less convenient to access.

8 0
3 years ago
What is the benefit of a cloud computing infrastructure? ○ Companies have full control over the data that is hosted. ○ Companies
Volgvan
Most valuable reason for a company to switch to cloud computing is that they only have to pay for the resources they use, and since everything is being host by another company there is no need for internal host of application on private servers and cloud computing has top of the line security since they hire the best IT admin(s)
7 0
3 years ago
Jim is expecting a very busy weekend at his store, so he sent the following e-mail to his employees: ALL EMPLOYEES MUST WORK THI
Salsk061 [2.6K]

Answer:

The caps and bold letters makes it seem like his boss is yelling at him.

Explanation:

5 0
3 years ago
RAM memory is intended?
adell [148]

Answer:

RAM is a short abbreviation for Random Access Memory. It is the physical working memory used by your PC to temporarily store computer data. Your PC stores all open applications, files, and any other data into RAM for quick access. The more RAM you have installed, the more programs you can run at the same time.

8 0
2 years ago
Other questions:
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • e do loop differs from the while loop in that a. the while loop will always execute the body of the loop at least once b. the do
    9·1 answer
  • Suppose the file is sent continuously as one big message. how long does it take to send the file, assuming it is sent continuous
    15·1 answer
  • How is DATA sent across a Network?
    7·1 answer
  • What soft ware can you use to erase all of your data from a hard drive safely
    13·1 answer
  • Why must you be careful when handling a hard drive?
    10·1 answer
  • Question 5(Multiple Choice Worth 5 points)
    10·2 answers
  • Fix the code :)
    10·1 answer
  • How do we find the time complexity for this algorithm?
    6·1 answer
  • [2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!