1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
6

What are 7 key traits for knowing your audience

Computers and Technology
2 answers:
evablogger [386]3 years ago
5 0
Ask them what's ur name and get to the know them i have nothing really.
lana [24]3 years ago
5 0
Well, there are always people in the audience who ALWAYS want some sort of information to take with them, (The Gatherer), there are ALWAYS people who would like a time to socialize and get to know each other, (The Socializer), and finally, there are ALWAYS people who try to accomplish a lot during the time they have, (staying on topic, also know as the Time-Watcher). These are the key groups to look out for in an audience, and you could make sure that you have everything prepared for PURE satisfaction. The groups were from a book by Cyndi Thero. I just made up my own names for them. 
You might be interested in
If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
gayaneshka [121]

Answer:

The correct answer to the following question will be "Server role migration".

Explanation:

  • A process of moving data from one data to the next. Security concerns are the causes behind the system relocation, the hardware is also being changed and several other influences.
  • With this, you are setting up a new server, either virtual or physical, running a new version of Windows (Windows Server) and then moving your positions and facilities to the newly constructed Windows Server Virtual Machine/Physical.

Therefore, it's the right answer.

3 0
4 years ago
25 POINTS! Complete each sentence to describe the Excel interface.
Readme [11.4K]

Answer:

Hi there!

Your answer is

1) A. Ribbon

2) C. Formula Bar

3) C. Title Bar

I hope this helps!

4 0
3 years ago
Read 2 more answers
Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has download
Novosadov [1.4K]

Incomplete question. The full question read;

Why is Jim having these problems?

Options:

A. Security scanners are not designed to do testing through a firewall.

B. Security scanners cannot perform vulnerability linkage.

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

D. All of the above.

Answer:

<u>D. All of the above.</u>

Explanation:

<em>Remember, </em><u>security scanners</u> are only designed to <em>gather</em> information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.

Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.

3 0
3 years ago
nancy finds it difficult to locate emails in her inbox . what action should she take to locate a particular type of email instan
Anuta_ua [19.1K]
Well, what Nancy can do is either search for her e-mail and access it or Nancy can restart her device.      :D Hope this helps

8 0
3 years ago
kelly wants to buy a new operating system for a laptop. under which category will it be in online store?
GuDViN [60]

Answer:

Kelly should look at the electronics section, where the laptops are because a laptop is an electronic. Just like an iPhone, iPad, and a TV.

7 0
4 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • What is the definition of an extinct species?
    8·2 answers
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • What is the difference between a switch and a hub?
    8·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    5·1 answer
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary c
    15·1 answer
  • music sites through schools wifi 2020 What is one thing a person should do to stay safe when exercising? 100 pts.!
    10·2 answers
  • Does putting a glue stick on your touchpad make it stop working pls help
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!