1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
7

When is it appropriate to use images in presentations?

Computers and Technology
2 answers:
Svetach [21]3 years ago
7 0
The answer to the question is c
Soloha48 [4]3 years ago
5 0

Answer:

c. To Illustrate key points simply

Explanation:

Depending on your audience, Images help convey your messages or important points faster. Though they do not have to be much especially if irrelevant. Just focus on the point to be driven home and add images as needed.

NB. Too many irrelevant images can make your slide unnecessarily large in size.

You might be interested in
Help I need the code for In and out Milky Way in CoderZ
inn [45]

Answer:

it is code A o

Explanation:

4 0
2 years ago
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
2 years ago
Read 2 more answers
What are examples of people who own the copyrights of their property? Check all that apply.
jolli1 [7]
"Nevaeh thinks of a name for her new company", "Alexis thinks of an idea for a new product" and "Josiah writes a poem" are open to copyright because they can claim that their work is original and cannot be reproduced without their consent. 
3 0
3 years ago
Read 2 more answers
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
What does C.L.O stands for?
Ray Of Light [21]

It stands for 'collateralized loan obligation'

Meaning,
A collateralized loan obligation (CLO) is a security backed by a pool of debt, often low-rated corporate loans.

4 0
2 years ago
Read 2 more answers
Other questions:
  • You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o
    7·2 answers
  • What is the disadvantage of a series circuit? A. The lights in a series circuit shine too brightly B. A series circuit can have
    8·1 answer
  • You often insert your company's logo into documents you create. One way to make it easier for you to quickly insert it is to sav
    10·1 answer
  • Which of the following might indicate a source on the internet is NOT reliable?
    6·1 answer
  • What statement best describes Konrad Zuse?
    6·2 answers
  • Give a recursive algorithm for finding the sum of the<br> first n odd positive integers.
    8·1 answer
  • Trina Hauger works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure the ethical and legal use of
    13·1 answer
  • In a Windows environment, __________ is a powerful tool that enables security administrators to share user and group definitions
    10·1 answer
  • Technician A says that the reserve rating of a battery is the amount of steady current that a fully charged battery can supply f
    6·1 answer
  • The code on the side is a software solution to the mutual exclusion problem for two processes. It shares two variables:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!