1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
7

Macy reviewed Steve's presentation. Images in the slides were distracting from the presentation. What advice should

Computers and Technology
2 answers:
murzikaleks [220]3 years ago
8 0
From what i learned from school, have a theme for the presentation and only have 1-3 pictures per slide that aren’t too big but small enough so you can read and see, also pictures that are self explanatory
Natali5045456 [20]3 years ago
7 0

Answer:

Graphics should only be used when they enhance the content of the presentation (Odyssey-ware)

You might be interested in
Why is binary code made up of a series of ones and zeros?
Nadusha1986 [10]

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often the binary number system's 0 and 1. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

8 0
3 years ago
Which of these lights is NOT part of the standard three-point lighting setup?
Contact [7]

Answer:

i believe background lighting

8 0
2 years ago
You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
Tema [17]
B.) phishing
Definition of phishing:
Try to obtain financial or official information from internet users, usually sent as an email to look like it is from a legitimate company
6 0
3 years ago
1. Add the following method to the Point class:
Pachacha [2.7K]

Answer:

Explanation:

The following code is written in Java and creates all of the methods that were requested in the question. There is no main method in any of these classes so they will have to be called from the main method and call one of the objects created method for the code to be tested. (I have tested it and it is working perfectly.)

class Point {

   private int x, y;

   public void Point(int x, int y) {

       this.x = x;

       this.y = y;

   }

   public double distance (Point other) {

      double distance = Math.sqrt(Math.pow((other.x - this.x), 2) + Math.pow((other.y - this.y), 2));

      return distance;

   }

   

   public int quadrant() {

       if (this.x > 0 && this.y > 0) {

           return 1;

       } else if (this.x < 0 && this.y > 0) {

           return 2;

       } else if (this.x < 0 && this.y < 0) {

           return 3;

       } else if (this.x > 0 && this.y < 0) {

           return 4;

       } else {

           return 0;

       }

   }

}

class Name {

   String firstName, lastName;

   char middleInitial;

   

   public String getNormalOrder() {

       String fullName = firstName + " " + middleInitial + " " + lastName;

       return fullName;

   }

   

   public String getReverseOrder() {

       String fullName = lastName + ", " + firstName + " " + middleInitial;

       return fullName;

   }

}

4 0
2 years ago
In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
dexar [7]

Answer:

 Auto-negotiation protocol is the modern technology in the networking. This protocol allow the ethernet equipment for automate different instillation steps. This type of protocol use by interconnecting various electronic devices for negotiating the speed of the link.  

Advantages:

  •  The auto negotiation protocol features used to maximize the throughput of data link layer.
  •  This protocol are basically useful in the local area network (LAN), with multiple capability of connections.
  •  The auto negotiation protocol extremely useful in twisted pair which are based on ethernet.

Disadvantages:

  •   This type of protocol are not fixed data links and not used as backbone of the networks.  
  •  Duplex mismatch occur then, it cause significant loss in the packets.

7 0
3 years ago
Other questions:
  • DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
    7·1 answer
  • What must be done if the intended destination hardware is not supported by the chosen OS?
    6·1 answer
  • Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage informa
    12·1 answer
  • Which of the following is NOT an example of a font style?
    13·1 answer
  • In a ___ traversal of a binary tree, you begin at the root and visit nodes one level at a time
    10·1 answer
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
    6·1 answer
  • My dog peed in the house last week
    6·2 answers
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!