1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
11

How many slides should a presentation include?

Computers and Technology
2 answers:
garri49 [273]3 years ago
6 0
B.) is the correct answer I believe.
A.) is incorrect because in a presentation, a slide is organized by every major point.
C.) is incorrect because you definitely need a good amount of slides for a well-developed presentation.
D.) is incorrect because while you do need enough information to present your information clearly, the answer emphasizes the words "only enough," meaning bare minimum.

Hope this helps! (: 
artcher [175]3 years ago
4 0
D. You only really need important information in a presentation.
You might be interested in
What is the process called when programmers look for and fix errors in code? Analysis Debug Document Error check
Sunny_sXe [5.5K]
It’s Debug. definition: “identify and remove errors from (computer hardware or software)”.
4 0
3 years ago
Read 2 more answers
The _____ is an information and communication-based electronic exchange environment mostly occupied by sophisticated computer an
Airida [17]

Answer:

The correct answer to the following question will be "Marketspace".

Explanation:

  • A relatively new marketing term which seems to be a simulated market place. It's an area for the electronic exchange of ideas and information in which external boundary restrictions are removed, termed as Marketspace.
  • The electronic trading world focused on connectivity often filled by advanced computer and telecommunications technology and digitized deals.

Therefore, Marketspace is the right answer.

5 0
3 years ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
2 years ago
Decision trees are onlyapplicable to problems under certainty.<br> True<br> False
lions [1.4K]

Answer: False

Explanation:Decision tree is the tree like structured flowchart which is used for the evaluation of the possible outcomes or result of the particular problem. It usually has two or more branches as the the result node . Decision tree are applicable to many problems for solving it. So, decision trees is not only applicable on certainty problems but also on other problems as well. Therefore the given statement is false.

6 0
3 years ago
Please help!
34kurt

Answer:

I don't know the exact fix to this because I don't know exactly what you're talking about, but I do suggest you instead just highlight with shift and the arrow keys to make it much simpler.

7 0
2 years ago
Other questions:
  • True or False?
    5·1 answer
  • You can use predesigned, formatted files called _____ to create new worksheets quickly.
    13·1 answer
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • Be my friend plzzzzzzz
    7·2 answers
  • The color gradient is
    6·1 answer
  • The Internet began when a large company wanted to sell products online.
    11·2 answers
  • Ano ang ibig sabihin ng tanka<br>​
    5·1 answer
  • Write a Java program that has a static method named range that takes an array of integers as a parameter and returns the range o
    10·1 answer
  • Do you know how to change your grades on a printer???????????
    13·1 answer
  • Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!