1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
9

Jason is making a presentation on power dressing. Jason completes the presentation on his laptop. However, on the day of deliver

y, the laptop only works intermittently. Which step can Jason take to deliver the presentation despite the glitch ?
A) postpone the presentation to another day

B) copy the presentation to a cd and copy it to another laptop/computer

C) email the presentation to all the participants

D) quickly print all the slides of the presentation and refer to them

E) leave the presentation aside and just talk on the topic itself
Computers and Technology
2 answers:
Lisa [10]3 years ago
6 0

Answer:

B.copy the presentation to a cd and copy it to another laptop/compute

Explanation:

NNADVOKAT [17]3 years ago
4 0

Answer B. This is probably the most logical answer.

You might be interested in
Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
pochemuha

Answer:

In HTML file

<body style="background-color:orange;">

Or

In CSS file

body {

background-color: orange;

}

7 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Help me please. i need you help​
Fudgin [204]

Answer:

Can you provide the code

7 0
3 years ago
Ignore this it a temporary note for me: SPSstudents
Westkost [7]

Answer:

okk

Explanation:

3 0
2 years ago
Montoya Consumer Products Inc is implementing Service Cloud. They typically handle 50,000 customer inquiries per day. What shoul
maksim [4K]

Answer:

Option A is correct

Explanation:

It would help in building the right architecture and configuration that would decrease those operations times by a large magnitude like uploading or updating large number of records.

8 0
3 years ago
Other questions:
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter.
    6·1 answer
  • What happens when i expose a disk to magnetic fields?​
    5·1 answer
  • What is a characteristic of high-level languages?
    15·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
    5·1 answer
  • I need help now with YT
    7·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!