1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
8

Which of these options would likely have a better playback experience in your presentation?

Computers and Technology
2 answers:
taurus [48]3 years ago
4 0
The correct option is B.
A short movie clip that you embedded into the file will play better because it is part of the file, it has been integrated to the presentation file. Short video clip that augments one's presentation is an excellent means of capturing the audience's attention and it also serves to pass across one's information clearly and vividly.
Rus_ich [418]3 years ago
4 0

Answer:

B

Explanation:

You might be interested in
Given the function definition void something ( int a, int& b ) { int c; c = a + 2; a = a* 3; b = c + a; } what is the output
timurjin [86]

Answer:

1 14 3

Explanation:

If that code fragment is put under a main() function and then it will yield the above output. According to the function something(), only changes in value second parameter will be reflected and first will be unchanged because second is passed by reference and the first one is passed as value so only address of 's' is passed, so, only its value is changed and the rest are same.

8 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Suppose we can buy a chocolate bar from the vending machine for $1 each. Inside every chocolate bar is a coupon. We can redeem s
Tanya [424]

Answer and Explanation:

Using JavaScript:

/* program should take N input which represents the dollar amount and output how many chocolate bars and how many coupons we have*/

function chocolatebar(dollars){

var dollaramt= dollars;

var i;

for(i=0; i <= dollaramt; i++){

i=i+6

?

Alert ("you have 1 extra chocolate bar");

:

Alert ("keep buying chocolate bars to get more coupons for a bonus chocolate bar")

}

}

*

7 0
3 years ago
What is printed by the following program? var isRaining = false; var isCloudy = false; var isSunny = !isRaining &amp;&amp; !isCl
hram777 [196]

Answer:

The output to this given question is "Is it warm: true".

Explanation:

In this question firstly two-variable defines that are isRaining and isCloudy. In those variables assign false value. Then we define another variable that is isSunny. In isSunny variable, we check condition that is if variable isRaining not AND (logical gate) variable isCloudy not equal to isSunny. The AND logical gate is used to check that both condition is true or not. Then we define another variable that is isWarm. In this variable, we check condition if isSunny OR (logical operator) isSummer is true. The OR operator is used to check in both value if one condition will true it will print true. At the last will print the value.

8 0
3 years ago
Users of an extranet can access a company or organization’s entire intranet
Tasya [4]

Answer:

yes

Explanation:

yes

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names
    5·1 answer
  • Small robots that can move around on the surface of a planet are called space shuttles.
    12·2 answers
  • A ________ is a material deficiency, or combination of significant deficiencies, that results in more than a remote likelihood t
    6·1 answer
  • To whom the script most important
    13·1 answer
  • What can you find the under the privacy policy section of a shopping website?
    12·1 answer
  • Joseph wants to take out the color of the background wall from an image what can Joseph do to achieve this​
    5·2 answers
  • Are all the computer users known as programmer ​
    11·1 answer
  • Please help me with these questions. Thanks o((&gt;ω&lt; ))o
    12·1 answer
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
  • joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm h
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!