1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
5

Delivering your presentation extemporaneously means reading directly from your slides and/or notes.

Computers and Technology
1 answer:
tia_tia [17]3 years ago
8 0
The answer is b. False.  The extemporaneous presentation does not read directly from the slides The extemporaneous<span> speech involves the speaker's use of notes and some elaboration to deliver a speech. A speaker who uses this method would have note cards or prompts that guide him from point to point, but he uses his own words as he goes along. He has a loose guideline for his speech,  he just used cues to know where to go next.</span>
You might be interested in
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
What are the functions of information technology?
Gekata [30.6K]

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

3 0
2 years ago
PLEASE HELP!!!!!!!!!!
SCORPION-xisa [38]
I don’t know if u tried this yet but maybe acetone can help or vinegar?
8 0
3 years ago
Read 2 more answers
Susan is assisting a web designer to create a promotional web page on eco-friendly classroom designs. She uses color combination
Nadusha1986 [10]

Answer:

D. Complementary Color Chord

Explanation:

I took the test

8 0
3 years ago
You can Hyperlink by:
aniked [119]

Answer:

All of the above

Explanation:

I tryed them all

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • A major ozone depletion happened in the 1900s. What was it caused by
    10·2 answers
  • In Java please:
    13·2 answers
  • Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
    13·1 answer
  • What are the cues that a website is safe to use for exchanging sensitive information?
    10·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    7·1 answer
  • What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
    5·1 answer
  • What are three limitations of computer?​
    13·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
  • Television, the internet, and smartphones are different communication _______blank hsn uses in its imc.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!