1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
11

When you are printing handouts, which of these can you do? A. Save paper by placing more than one slide per page. B. Check the f

low of your presentation. C. Provide people with a copy of your presentation while you are presenting it. D. all of these
Computers and Technology
1 answer:
den301095 [7]3 years ago
7 0
<span>All of these are correct. When you are printing handouts you can save paper by placing more than one slide per page. Second, it can help you check the flow of your presentation and for you to be familiarized with the sequence. Lastly, you can provide people with a copy of your presentation for them to keep track of the flow.</span>
You might be interested in
Within MethodsPractice.java, write a method public static int planParty2(int f, int c, int p) that performs the same calculation
Vesna [10]

Answer:

// class definition of MethodPractice

public class MethodPractice {

   // main method that begin program execution

   public static void main(String args[]) {

       // call to the planParty2 method is done using some parameter

       // and the return value is displayed

     System.out.println("The number of p-packs needed is: " + planParty2(9, 14, 6));

     System.out.println("The number of p-packs needed is: " + planParty2(4, 6, 3));

     System.out.println("The number of p-packs needed is: " + planParty2(4, 6, 4));

   }

   

   // planParty2 method with 3 parameters and it return an integer

   // the calculation needed to get the required pack is done here

   public static int planParty2(int f, int c, int p){

       // the party owner is added to list of friend

       // and the value is assigned to totalPeople

       int totalPeople = f + 1;

       // the totalPeople times the can drink

       // is assigned to totalDrinkNeeded

       int totalDrinkNeeded = totalPeople * c;

       // number of packs required is declared

       int numberOfPacks;

       // if the totalDrinkNeeded contains exact multiple of a pack

       // we return the numberOfPack by dividing totalDrinkNeeded with p

       if (totalDrinkNeeded % p == 0){

           return numberOfPacks = totalDrinkNeeded / p;

       }

       // else we compute if the totalDrinkNeeded is not a multiple of a pack

       //  first we get the remainder when the totalDrinkNeeded is divided with p

       // then the needed can is computed by subtracting remainder from p

       // the neededCan is added to totalDrinkNeeded, then divided with p

       // and assigned to numberOfPacks

       // numberOfPacks is returned.

       else {

           int remainder = totalDrinkNeeded % p;

           int neededCan = p - remainder;

           numberOfPacks = (totalDrinkNeeded + neededCan) / p;

           return numberOfPacks;

       }

   }

}

Explanation:

Image showing the detailed question is attached.

The program is written in Java and is well commented. A sample image of program output when it is executed is attached.

3 0
3 years ago
Which of the following behaviors is considered ethical?
kolezko [41]

Answer:

answer is c. using a limited access public computer to watch movies

7 0
3 years ago
Read 2 more answers
Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
Nikitich [7]

Answer:

Explanation:

The following code is written in Python and is a function that loops three times asking for the last name and first name. Then it uses this information to create a username. Finally, each of the names and usernames is printed on the screen.

def userName():

   for x in range(3):

       last_name = input("What is your last name: ")

       first_name = input("What is your first name: ")

       username = first_name[:3] + "#" + last_name[-3:]

       print(last_name + ", " + first_name)

       print(username)

7 0
3 years ago
What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
neonofarm [45]

Answer:

When the user concludes the value of "vals[4][1]", then it will give an exception of "ArrayIndexOutOfBoundsException".

Explanation:

  • It is because the size of the above array is [4*3] which takes the starting index at [0][0] and ending index at [3][2]. It is because the array index value starts from 0 and ends in (s-1).
  • When the double dimension array size is [5][5], then it will conclude the value of [4][1].
  • The above array have following index which value can be calculated :-- [0][0],[0][1],[0][2],[1][0], [1][1],[1][2], [2][0], [2][1], [2][2],[3][0],[3][1] and [3][2].
4 0
4 years ago
The phase of hacking where the attacker creates a profile of the target is known as ________________ and is also referred to as
tatyana61 [14]
The stage of hacking where the attacker constructs a profile of the target is recognized as Foot-printing and is also referred to as reconnaissance. Reconnaissance is perhaps the extensive phase that is occasionally weeks or months. The black hat uses a diversity of causes to learn as much as likely about the target business and how it functions as well as internet searches, social engineering, dumpster diving, domain name management or search services and non-intrusive network scanning. The undertakings in this phase are not easy to protect against. Facts about an organization find its method to the internet via many routes and employees are often trapped into providing tidbits data which over time, act to complete a complete picture of procedures, organizational arrangement and possible soft spots. 
4 0
3 years ago
Other questions:
  • Throwing an improperly drained oil filter into the trash dumpster is a violation that can carry heavy penalties. A) true b) fals
    7·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • Are computer virus and human virus the same​
    6·1 answer
  • What group in the review tab contains the commands and to accept or reject changes made to a document
    14·2 answers
  • Create a program that prints out a list of all the divisors of a number stored in a variable. (If you don’t know what a divisor
    11·1 answer
  • The letters LAN stand for Area Network.
    9·2 answers
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • Why crt and plasma are not used in laptop ?​
    14·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
  • 4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!