1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
10

How long before a speech should you begin practicing?

Computers and Technology
2 answers:
gavmur [86]3 years ago
8 0
Answer is D) 3 weeks
hichkok12 [17]3 years ago
4 0

Answer:

D

Explanation:

You might be interested in
SOMEONE HELP ME ITS KINDA EASY
Over [174]

Answer:

USB COMPUTER, CONTROL,COMPUTER, ECT ECTT

Explanation:

4 0
3 years ago
Item 8 Item 8 Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive
Nadusha1986 [10]

Answer: Feedback

Explanation: Feedback is the reaction obtained in the form of information from the task a person has performed or any product. It gives the review of the service that is given by the customer, user etc.The reaction that is obtained can be a negative feedback or positive feedback.

Both types of feedback is necessary because it helps in the improvement of the service. The negative reaction will helps to change/improve the service that is not liked by the customer and positive feedback tells about the services appreciated by the customer. So, Shelby is also keeping the feedbacks for the same purpose for her salon business.

8 0
3 years ago
One benefit of social media is that they
allochka39001 [22]

They help us connect with the world and other people.

It also servrs as entertainment.

3 0
3 years ago
Read 2 more answers
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Write a program that reads in non-negative integers and stores and displays distinct numbers (i.e., if a number appears multiple
slavikrds [6]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

#define MAX 1005

bool already_present(int data[MAX], int input, int size)

{

int i;

for(i=0;i<size;i++)

if(data[i] == input)

return true;

return false;

}

int read_stdin(int data[MAX])

{

int input;

int size=0;

while(true)

{

cout<<"Enter a non-negative integer (negative to quit): ";

cin>>input;

if(input<0)

break;

if(!already_present(data,input,size))

data[size++] = input;

}

return size;

}

void print_stdout(int data[MAX],int size)

{

int i;

cout<<"You entered\n";

for(i=0;i<size;i++)

cout<<data[i]<<" ";

cout<<endl;

}

int main()

{

int data[MAX],size;

size = read_stdin(data);

print_stdout(data,size);

return 1;

}

4 0
3 years ago
Other questions:
  • Is the disk in the C: drive fixable or removable disk
    15·2 answers
  • Content controls cannot be removed, only edited. Please select the best answer from the choices provided
    10·1 answer
  • 1. of the following individuals, who was the most recent to develop information searching tools online? (points : 1) otlet wells
    5·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • For an alternative to the String class, and so that you can change a String's contents, you can use_________ .
    12·1 answer
  • a) Write a program that prompts for an integer—let’s call it X—and then finds the sum of X consecutive integers starting at 1. T
    6·1 answer
  • Write a routine to interchange the mth and nth elements of a singly-linked list. You may assume that the ranks m and n are passe
    10·1 answer
  • Which statement describe the advantages of using XML? more than one answer can be correct
    9·1 answer
  • Audiovisual technology is not important in a world that is interactive
    7·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!