1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Soloha48 [4]
3 years ago
6

Which of the following likely comes last in developing a presentation outline

Computers and Technology
2 answers:
kari74 [83]3 years ago
8 0
So in developing a presentation outline, the first thing that we are going to do is to introduce what it is all about. This means that the main points come first. After the main points, follow the sub points. The sub points serve as the explanation of the main points. After the sub points are the illustrations and examples. These are already the specifics which support the sub points and the main points. Therefore, the answer is A.
Andreyy893 years ago
5 0

Answer:

The answer is illustrations/examples

Explanation:

Think of carving a sculpture. When carving you will start by chipping away at big chunks of clay, this is your main points. Then after the big chunks of clay are gone you will start to create the shape of your sculpture. You will chisel away at your clay with a more precise tool which are your sub-points. After the figure of your sculpture is defined you will start to create more details, this is your illustrations/examples.

Btw I've never sculpted anything but I generally know how to I guess. Also if that explanation wasn't enough for you, I just answer that question on a quiz and it said I was right so...

You might be interested in
Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
il63 [147K]

Answer:

B

Explanation:

XML is mostly used for structural purposes

6 0
2 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
2 years ago
An array of integers can be assigned to a memory address in the ...
fenix001 [56]

Answer:

A :)

Explanation:

8 0
2 years ago
The ACME Online Store offers different preferred customer discounts for customers who are "None", "Bronze", "Silver" and "Gold".
Nookie1986 [14]

Yes, the written program has the correct logic to assign the correct discount for each of the 4 valid values of customer_category

<h3>What is a Program?</h3>

This refers to the sequence of instructions that are keyed into a computer to execute user-specific commands.

Hence, we can see that based on the variable customer_category that has a string that is one of these 4 values:

0 for "None"

5 for "Bronze"

10 for "Silver"

20 for "Gold"

The program uses the correct syntax as it gives the correct discount based on the assigned values of the variable customer_category as executed with the syntax above.

Read more about programs here:

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
Your ipad has an application that will not stop running. what feature/tool can you use to stop it? kill treason task manager for
saveliy_v [14]

you could force quit

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which device lets you hear audio on your computer?
    12·2 answers
  • In which situation will file compression be required to complete the task
    15·1 answer
  • In terms of object-oriented programming,after class is defined,________ can be created for that class.
    15·1 answer
  • Using a caesar cypher with an offset of three characters (a -&gt; d, b -&gt;e, ...., z -&gt; c), what would be the correct cyphe
    6·1 answer
  • “identify the skill in the following scenario” :
    6·2 answers
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • Write Tic tac toe program in python for beginners pls
    10·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • You are the IT administrator for a small corporate network. The employee in Office 2 is setting up a virtualization environment
    10·1 answer
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!