1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
3 years ago
13

Mara's presentation included essential information about the company's new safety procedures. She wanted to make

Computers and Technology
2 answers:
Ratling [72]3 years ago
8 0

actually, the correct answer is "she should use the same slide transition for each slide."

hope this helped :)

geniusboy [140]3 years ago
4 0

Answer:

C. She should use a different transition on each side.

Explanation:

Using different transition make the slides look more attractive. It helps to gain attention from the audience as it shows the skills and efforts of the presenter. On the other side, Mara should not use two animations on each slide as repeating the same thing on every slide make the presentation boring. Also, the use of the same transition for every slide does not show any effort of the presenter. When a presentation shows the effort and skills of a presenter, it automatically gains close attention from the audience.

You might be interested in
The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
DaniilM [7]

Answer:

<em>The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. </em>

Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

  • Operating systems fundamentals

An operating system is the fundamental software which is needed to run a hardware every electronic hardware need an instruction set to make the hardware working. We can say that operating system is communication medium between the user as well other software to the hardware. Hardware don’t know the language of user and user don’t know the language of hardware how to give instructions to the hardware to perform some specific task so Operating system do this functionality to meet the needs of both user and hardware.

  •  The applications of the OS

Applications of operating system are following  

  • Security

Operating system make sure that all the user data is secured and an unauthorize source cannot access the computer to make any changes in user data or any other program.

  • Communication b/w application software and user

The other application of operating system is that it provides a communication channel b/w user and other application program by using some sort of compilers, interpreter to meet the user needs.  

  • File Management

Operating system also provide an essential feature of managing files. It provides complete directory and easy navigation of files and their usage access. It keeps track that where the information is stored and all other details that thing is known as file system.

  • Device Management  

Operating system also keep track of all the devices connected to it install their respective device drivers if available and make them available. OS do communication with the devices connected to it and then perform instructions via hardware and allocate which instruction set should be assign to which device.

  • Processor Management

OS control the multitasking feature of the processor. It makes an order of list of all the tasks which need to be done on processor and assign them according to there priority and also manage for how much time that task is assigned to the processor.

  • Error Detecting

OS keep track of all the information of the health of the computer and detect errors if available to avoid malfunctioning of the computer.

  • The Embedded OS

Embedded operating system are specially designed operating system which are used to for special purpose hardware/embedded system. These OS are more efficient than the simple OS and have limited features. They are designed to be compact and resource efficient. It perform real time operations and very responsive to the instructions. In our daily life ATM machine have an embedded OS, smart phones also have and in medical like MRI machine.  

  • Information system architecture

The information system is defined as formal definition of the business processes, product technologies and working system structure and other technical framework for a business organization. Information system architecture have four layers “Business Process Architecture”, “System Architecture”, “Technical Architecture” and “Product Architecture”.

Information system architecture consist of the software and hardware used to meet the consumer needs. It consists of a documented detail of software hardware used and networked and future plan to add some other features if needed to upgrade or change the system.

  • Cloud computing

Cloud computing is defined as on demand availability of computer resources over the network/internet like storage, software or processing without using the current system all the work is done on a system far away which is available on internet and can be accessed from anywhere. For such services there are data centers which store data on servers to make them available to there user.  

Cloud computing have some types like SaaS (Software as service), Storage, Database, Security, Platform as service.

4 0
3 years ago
What is the tendency for an individual to have better memory for information that relates to oneself in comparison to material t
Elena-2011 [213]

Answer:

The answer is "Option c".

Explanation:

The self-reference will affect the appears, that enables the people to transmit data separately, as per their degree of knowledge, If people are willing to identify the information, the frequency of recalling may be increased if it is linked in some way to ourselves, and other options are wrong, that can be described as follows:

  • In option a, It is used to store information for a long time, that's why it is not correct.
  • In option b, It is used for both, input and receives sensory register and the long-term store, that's why it is not correct.
  • In option d, It provides cognitive interference that's why it is not correct.
4 0
3 years ago
Why does the media play such an important role in our personal freedom? Select 3 options.
Helga [31]

Answer:

It promotes self-expression

It holds the government accountable

It keeps us informed

Explanation:

I got them right Ed

7 0
2 years ago
What may happen if a large number of computer users are trying to access a web site at the same time as you ?
Ber [7]
It Will Say " Too Many People At A Time Trying To Get In " And It Will Say Wait .
6 0
3 years ago
Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
sattari [20]

Answer:

from functools import reduce

def prod_all(*args):

   prod = reduce(lambda x,y: x *y, args)

   return prod

result = prod_all(4,6,8)

print(result)

Explanation:

The use of the "*args" passes a tuple of variable length to a python defined function. The function above takes any number of arguments and returns the product using the python reduce module and the lambda function.

3 0
3 years ago
Other questions:
  • A. STOP: What is a technology habit you practice today that you now realize will not help you to be successful? Explain why it’s
    10·2 answers
  • A college meal plan allows students to:
    7·2 answers
  • In scratch coding what can I do with "when I recive messeage 1 "
    15·1 answer
  • Sql provides the ________ technique, which involves placing an inner query within the where or having clause of an outer query.
    8·1 answer
  • A computer system has 9,850 processes and 172 of them were suspended while 276 of them were terminated. Explain why some of the
    12·1 answer
  • A cost-benefit analysis is intended to increase the likelihood that a support analyst has considered the major advantages and di
    5·1 answer
  • To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu
    15·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 10 miles, 5
    15·1 answer
  • A service _ consists of overhead wires and devices that connect the power company power lines to a residence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!