1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
5

Which presentation guideline helps people with vision disabilities?

Computers and Technology
2 answers:
Alina [70]3 years ago
4 0
Providing audio with images
Lerok [7]3 years ago
4 0

providing transcripts

You might be interested in
What is a file explore?
Tcecarenko [31]
File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.
7 0
3 years ago
What are three good things and three bad things about the metal pewter
Setler79 [48]
Good things:
It is a solid material,NOT plated which makes it easily engravable.
does not tarnish or
discolor easily

Bad things:
It is not a high quality metal
It will melt at low temperatures,so do not get it around extreme heat.
It can damage easy if exposed to acids like lemon juice or vinager


4 0
4 years ago
Which statements describe front-end databases? Check all that apply. They can be used to store tables. They can be used to store
Maslowich

Answer:

you don't know you are so much noob bruda

7 1
2 years ago
Dogs are great pets for families because they teach children many important life lessons. (2) A dog must be walked and fed at ce
PIT_PIT [208]

The answer is A on edge. A)Just like homework and other activities, helping to take care of a dog teaches a child about responsibility.

4 0
3 years ago
Read 2 more answers
Computer security is the use of ____ security techniques to protect data stored on computers.a. physicalb. portc. ​logicald. ​en
Arte-miy333 [17]

Answer:

anti virus

Explanation:

3 0
4 years ago
Other questions:
  • What at some advantages of creating a powerpoint?
    9·1 answer
  • A user could find the icon for an attached usb flash drive under what heading in the my computer/computer window?
    7·1 answer
  • Write a fragment of code that reads in integers from standard input, until end-of-file and sends their (floating point) average
    14·1 answer
  • What are the two ways to print a document?
    11·1 answer
  • Describe the three essential characteristics of an object fromthe perspective of object oriented paradigm.
    7·1 answer
  • Why media is far from government​
    6·2 answers
  • Which of the following will you do in step X in the following series of clicks to change the bounds of
    10·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
    10·1 answer
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!