1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
11

Which of the following is not an example of a technological aid?

Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
6 0
I think the correct answer among the choices given is option A. Manipulative aids are not technological aids. It refers to items that is used to support hands-on learning like markers, toothpick or coins. Technological aids, on the other hand, are things which makes use of the new technology present like slideshows, DVD's, audioclips and projectors.
You might be interested in
When you include a word cover page in a multi page document, the cover page is not considered the first page. True or false?
____ [38]
It ture on the cover page include
4 0
3 years ago
A presentation has bullet points that move. The presenter wants to use these bullet points in several other places in the presen
goldenfox [79]

Answer: Animation Painter.

In Microsoft Powerpoint, the most common method would be to simply animate each bullet point in the entire presentation. The Animation Painter is a tool that has been included to copy all the animations of a single object and apply them to another object selected.

How to use:

  1. Select the object with the animations already applied to.
  2. Click on the Animation Painter.
  3. Select the object that you would like to apply the animations to.
  4. Done.
6 0
3 years ago
Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
kati45 [8]
Last one I am not sure they
4 0
3 years ago
Write a program to test the various operations of the class clockType
Umnica [9.8K]
The class clock type was designed to implement the time of day in a program. Certain applications, and additions to hours, minutes, and seconds, might require you to start at the time zone.
5 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
3 years ago
Other questions:
  • A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
    12·1 answer
  • Match each task with the features necessary to complete the task
    10·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    10·2 answers
  • Which one of the following items is an example of software?
    5·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Create a two functions: first called grocery_cost(food), where food can be one item or a list of items from the stock and price
    7·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
  • before you start researching fleet management software, your first task is to clearly define the problem. this will help guide y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!