1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
15

It is always better to run over and give more information when you are giving a presentation versus quitting on time. true false

Computers and Technology
2 answers:
GaryK [48]3 years ago
8 0
True , to make your audience interested you should always give more information on the subject but don't bore them so that they wish for you to quit on time
Talja [164]3 years ago
7 0

Answer:

The answer is true

Explanation:

I hope this helps

You might be interested in
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
You open a folder by double-clicking on it with your mouse. True False
allsm [11]
Depends if it's not working the first time then u click it twice but normally you click it once
5 0
3 years ago
Read 2 more answers
When was technology created?
ANEK [815]

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

3 0
1 year ago
The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
Tanzania [10]

Answer:

highest of five numbers in the file

Explanation:

  • This code reads the file "some-file.txt" and saves the result in variable "somefile"
  • The runs a for loop for a count of 5.
  • In each loop it compares the current value of the file with the value of the variable result and if the result is true it updates the value of the variable result.
  • At the end of this code the variable result will contain the highest value in the file "some-file.txt" and print it.

3 0
3 years ago
Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
DaniilM [7]

A dial-up access connection supports a speed up to <u>5</u><u>6kbps</u>, whereas an ISDN line goes up to 1.9Mbps. A DSL connection can support a maximum of 20<u>mbps</u>. Internet access speed through cable TV is capable of up to 1000mbps.

Dial-up connection is by far the slowest of all known internet connections. The maximum speeds that can be supported by this connection are about 56Kbps. Use of this type of connection requires a separate phone line. In an ISDN type of connection, the maximum speeds depend on where in the world you are. The highest to have ever been recorded is an ISDN E1 line that has a combined data rate of 1.9 Mbit/s. Speeds transmitted through DSL are generally the same ones that are transmitted through cable internet and satellite connection. You can expect DSL speeds of 512Kbps to a max of 20Mbps. The cable internet is a broadband internet access and the highest bit rates of cable internet can go be up to 1GBPS which is equivalent to 1000Mbps.

6 0
3 years ago
Other questions:
  • Can a Web developer guarantee that data presented is valid? Why or why not?
    9·1 answer
  • In addition to regular watch features, which two features are often found on smart watches?
    13·1 answer
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • A band wants to know what their most popular CD is so that they can have more copies made to sell. Which statistical measurement
    11·2 answers
  • Imagine the user types in a complete sentence, but we want to read only the first word and place it in the String variable word.
    11·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • The range of a finite nonempty set of $n$ real numbers $S$ is defined as the difference between the largest and smallest element
    15·1 answer
  • Helppppppppppppppppppppppppppppppppp
    13·2 answers
  • Evaluate and compare free and commercial versions of the Avast antivirus software
    6·1 answer
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!