1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
11

Phoebe has to give a permission about recycling. Where should she look while presenting?

Computers and Technology
1 answer:
pickupchik [31]3 years ago
7 0

I would say B because its good to make eye contact and shift your gaze so you arent only staring at one spot


You might be interested in
Have you searched Buzz Ch.at on playstore​
deff fn [24]

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

3 0
3 years ago
List three things to be safer online.
kenny6666 [7]

Answer:

1. do not give out your age

2. don't use your real name unless you are supervised

3.dont put all your information out there

5 0
3 years ago
Question 1 of 40
Novay_Z [31]

Answer:

D. Federal Work-Study

Explanation:

8 0
3 years ago
Which of the following best describes the displayport interface used for connecting video monitors to computers
Lesechka [4]

Answer:

Displayport uses a lower voltage than DVI and HDMI.

Explanation:

DisplayPort are cables and connector used to stream video, audio, usb or other kinds of data to the monitor screen of a computer. As defined, it can send video and audio signals on the same cable, over a long distance at a high speed.

The voltage requirement for DisplayPort is 3.3 volts while HDMI and DVI uses 5 volts.

3 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Other questions:
  • Which is faster, a hi-speed usb port or a superspeed usb port?
    15·2 answers
  • When was unicode invented?
    13·1 answer
  • An iphone is a form of a computer
    7·2 answers
  • Why computer is known as data processing system?
    14·1 answer
  • What are the main types of reading tools? Check all that apply. please HELP​
    15·1 answer
  • What will you see on the next line?
    6·2 answers
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen
    5·2 answers
  • Choose the true statement below. (html)
    5·1 answer
  • What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!