1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
11

Phoebe has to give a permission about recycling. Where should she look while presenting?

Computers and Technology
1 answer:
pickupchik [31]3 years ago
7 0

I would say B because its good to make eye contact and shift your gaze so you arent only staring at one spot


You might be interested in
During an engine's intake stage, what passages inside the cylinder head of a gasoline powered engine must the incoming air-and-f
kow [346]
The intake ports must be open to allow fuel and oxygen to enter cylinder, then closes during compression. Your answer is A.
3 0
3 years ago
Super computer in nuclear energy ​
satela [25.4K]

Answer:

Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.

4 0
3 years ago
Most shop accidents are caused by?
Sindrei [870]

Answer:Most shop accidents are caused by÷

  • lifting
  • poor light
  • trips and falls
  • stress
  • dangerous materials
  • act of shop violence
  • dehydration
  • extreme tiredness
8 0
3 years ago
Which search engine optimization technique involves sending data describing your web site to the search engines and then paying
vazorg [7]

Answer:

Search feeds.

Explanation:

Search feeds seem to be the search engine optimization strategy includes transmitting information to those of the search engines that explaining the user's website and afterward charging the fee to assure that is pages would be included in the site engine listing.

So, the following answer is correct according to the given scenario.

8 0
3 years ago
Imagine you have borrowed your friend's computer to work on a class project. Checking
castortr0y [4]

Answer:

Yes.It would be considered as a computer Crime.

Explanation:

This is because you are an unauthorised user

6 0
4 years ago
Other questions:
  • Write a program named convertdate that converts a date entered by the user into another form. the user's input will have the for
    8·1 answer
  • What does the word “Gacha” come from??????
    5·2 answers
  • Answer for a, b, and c
    7·1 answer
  • TCP is a Transport-layer protocol used to communicate between applications, but it's a lightweight Transport-layer protocol, mea
    10·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • What are the 6 major forms that Energy can be grouped into?
    10·1 answer
  • Which of the following are good ways to keep your information and your computer secure?
    10·2 answers
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!