1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
3 years ago
13

Mara's presentation included essential information about the company's new safety procedures. She wanted to make

Computers and Technology
2 answers:
Ratling [72]3 years ago
8 0

actually, the correct answer is "she should use the same slide transition for each slide."

hope this helped :)

geniusboy [140]3 years ago
4 0

Answer:

C. She should use a different transition on each side.

Explanation:

Using different transition make the slides look more attractive. It helps to gain attention from the audience as it shows the skills and efforts of the presenter. On the other side, Mara should not use two animations on each slide as repeating the same thing on every slide make the presentation boring. Also, the use of the same transition for every slide does not show any effort of the presenter. When a presentation shows the effort and skills of a presenter, it automatically gains close attention from the audience.

You might be interested in
Sub to the channel plz plz
Hunter-Best [27]

Answer:

um

Explanation:

6 0
2 years ago
Read 2 more answers
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
What is the advantage of learning through story compared to learning through personal experience?
Inessa [10]

Answer:

Personal Experience

Explanation:

If a story is based on a personal experience then yes, the two doesn't matter. <em>However</em>, usually learning through personal experience is better because you learn firsthand while stories are written from a different perspective.

6 0
2 years ago
Read 2 more answers
The term “frivolous” implies that the author
tiny-mole [99]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
believes that the average individual does not need a smart phone 
<span>firivolous mean not serious, light, unimportant.</span>

3 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • In the Unified Process (UP), related activities are grouped into UP ____. a. Services b. Disciplines c. Cycles d. Practices
    11·1 answer
  • Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
    8·2 answers
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Importance of computer​
    15·1 answer
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
  • What is wrong with the following code? publicstatic char grade(int score) { if (score &gt;= 9) { return 'A'; } else if (score &g
    6·1 answer
  • Write an alogorithm and draw the Flow Chart to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!