1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
15

How can u refer to additional information while giving a presentation

Computers and Technology
1 answer:
yawa3891 [41]3 years ago
7 0

Answer:

There are various ways: Handing out papers/fliers to people, or presenting slides.

You might be interested in
In the context of an expert system, a _____ works with the knowledge base management system to ensure that the knowledge base is
defon

Answer:

Knowledge Acquisition Facility.

Explanation:

The power and effectiveness of the Expert System  is equal to the quality of the knowledge it contains. The  knowledge has to deal with high complexity and apply the best judgement. collection of expert knowledge is very important and involves the collecting information about a field usually from  an expert. This information is stored in a computer program stored as a knowledge base.

Knowledge is always updating so it also very important to keep it up to date and it is done by Knowledge Acquisition Facility.

3 0
3 years ago
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
lesya [120]

Answer:

/etc/timezone

Explanation:

Debian based Linux distribution is a free distribution software and an operating system. It is composed of a open source and free source software. It is one of the most popular distributions.

A computer file name is a unique system of identifying the computer stored file in the file system. The names of the different file system have different formats or extensions in the file name and imposed different file restrictions.

In the context, the full path and the file name of a file that displays a time zone settings on a Debian Linux distribution is " ../etc/timezone".

3 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Which type of electronic community allows real time discussion among members
GrogVix [38]

Answer:

Instant messaging is the type of electronic community that allows real-time discussion among members.

7 0
3 years ago
Any Genshin Impact Players? If so, who's your main?
Fantom [35]
I want to start playing!! it seems super cool, don’t know much ab it but i like paimon lol
5 0
3 years ago
Read 2 more answers
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • In the mouse properties Window, you Can
    6·1 answer
  • You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
    12·1 answer
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • Which of the following is true of information systems?
    15·1 answer
  • Which threading model is best for achieving true parallelism and how?
    8·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!