1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
7

Select all that apply. Two physical things you can do to demonstrate you are paying attention to a speaker are _____ and _____.

Computers and Technology
2 answers:
omeli [17]3 years ago
7 0
B and d ............
kherson [118]3 years ago
4 0
The correct answers are 
B) Face the speaker 
and 
D) Make eye contact 

You might be interested in
What is true about content based filtering
AleksAgata [21]

Answer: provide more info

Explanation:

8 0
3 years ago
Two files named numbers1.txt and numbers2.txt both have an unknown number of lines, each line consisting of a single positive in
Reika [66]

Answer:

see explaination for program code

Explanation:

scalar_product = 0

li=[]

li2=[]

#reading numbers1.txt and numbers2.txt intoli and li2 respectively

with open('numbers1.txt') as n1, open('numbers2.txt') as n2:

for line1 in n1:

li.append(int(line1))

for line2 in n2:

li2.append(int(line2))

#storing min list size into variable l

a=len(li)

b=len(li2)

if a<b:

l=a

else:

l=b

#calculating scalar product

for i in range(l):

scalar_product=scalar_product+li[i]*li2[i]

print("scalar product is",scalar_product)

6 0
3 years ago
A database can be used to manage which of the following for a website?
Oliga [24]
Images would probably be the best choice here
7 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
In Task 2, you worked with Sleuth Kit and Autopsy which rely on the Linux Web service called __________.
defon

Answer: Apache

Explanation:

You restarted Apache system in the cmd in the kali linux vm.

8 0
2 years ago
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • A loop within another loop is known as a(n) ____ loop.
    10·1 answer
  • When you use the mvc pattern for a java web application, you often add ________________________ to the request object before you
    7·1 answer
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • What is an active cooling solution for a PC?
    10·2 answers
  • A growling noise is heard only when the driver exerts force on the clutch pedal. No noise is heard when the clutch pedal is up.
    14·1 answer
  • You are responsible for the administration of your Windows Server 2016 DNS server, which is installed on a domain controller as
    8·1 answer
  • I was able to solve the question :))
    7·1 answer
  • Vices for a research paper
    6·1 answer
  • How do you do 3.4.5 Add parentheses for code hs? I need answers please
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!