1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
14

When a speaker is finished talking, you should allow for _____.

Computers and Technology
2 answers:
Alja [10]3 years ago
4 0
B................................
Arlecino [84]3 years ago
3 0

Answer:  Natural pause      

Explanation:  Natural pause is the temporary stoppage or halt moment that occurs due to natural reasons .When a person tries to take a moment from ongoing track which can be a speech , conversation, lecture etc. The hold occurring at situations can for  listening to the other part, take a hold from the communication and analyzing about it, etc.

It has the natural capability for managing and circulating experiences. Notes, encouragement and focus adjustment are not the adequate steps to be done after the speech rather should be performed before or during the speech.          

   

You might be interested in
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
Which of the following identifies the patterns used for each data series in a chart?
Lady_Fox [76]
The answer is A)Legend.
7 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
How do you change the order of the slides in your presentation within the outline pane? Drag icon up or down Delete slide icon C
Amiraneli [1.4K]

Answer:

Rearrange the order of slides

In the pane on the left, click the thumbnail of the slide that you want to move, and then drag it to the new location. Tip: To select multiple slides, press and hold Ctrl while you click each slide that you want to move, and then drag them as a group to the new location.

Explanation:

7 0
3 years ago
The ____ of a variable is the location in memory where it’s value is stored. A. Value B. Address C. Data type D. Number
fomenos

Answer: C. Data type

Explanation:

data types are defined as the data storage format that a variable can store a data to perform a specific operation. Data types are used to define a variable before its use in a program. Size of variable, constant and array are determined by data types.

3 0
3 years ago
Other questions:
  • true /falseCompression of entries in the term-document matrix can be used to reduce run-time storage and execution-time requirem
    10·1 answer
  • Many web browsers, including internet explorer, edge, chrome, and safari, have a(n) ____ option to browse the web without leavin
    12·2 answers
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • Today encoding scheme has taken over ascII by what
    5·1 answer
  • Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
    11·1 answer
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • 1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way
    12·1 answer
  • Test if the word mold is stored in the variable word.
    5·1 answer
  • How many passes will it take to find 30 using a binary search?
    6·1 answer
  • Which of the following could be a method for an object-oriented class called Student?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!