1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
12

Jack has been asked to create a presentation for a training module at his company. He is supposed to attach a video of an interv

iew with the CEO to his presentation. This video is also available on the company website. How can Jack attach the video to his presentation? Jack has two options. He can attach the video from a *blank* or from a (n) *blank*
1.) A. file on his computer B. camera connection C. previous presentation
2.) A. projector link B. internal link C. editing software
Computers and Technology
1 answer:
nalin [4]3 years ago
8 0

Answer:

Jack has been asked to create a presentation for a training module at his company. He is supposed to attach a video of an interview with the CEO to his presentation. This video is also available on the company website. How can Jack attach the video to his presentation? Jack has two options. He can attach the video from a <u>file on his computer</u> or from a (n) <u>internal link.</u>

Explanation:

The video file is stored on computer and website of the company. To add this video on presentation, Jack can directly add video from the computer, or Jack can add the link of video from the website. By clicking on just video link, the video will play during presentation.

You might be interested in
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
Which of these are steps in the testing cycle? Check all of the boxes that apply.
ollegr [7]

Answer:

A,C and D

Explanation: You're welcome

5 0
3 years ago
Read 2 more answers
Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function
MA_775_DIABLO [31]

Answer:

if ((b*b - 4*a*c)<0)

    cout << "no real solutions";

return;

Explanation:

To check if "b squared" – 4ac is negative, we use the expression  if ((b*b - 4*a*c)<0). This expression evaluates the 'bsquared' and substracts '4ac' from it. It then compares the resulting value with zero. if it is less than zero it means it is a negative number, so it executes the statement following cout << "no real solutions"; and returns

8 0
3 years ago
When is the following expression true? (2 points)
ipn [44]

Answer:

1) If and only if a and b have different values

Explanation:

Given

Expression: !(!a || b) || (!a && b)

Required

When is it true?

The expression is true when the values a and b are different and the proof is as follows.

(1) Assume that: a = true and b = false

!(!a || b) || (!a && b)  

= !(!true || false) || (!true && false)

!true = false, so the expression becomes:

= !(false|| false) || (false && false)

In boolean, false|| false = false and false && false = false. So, we have:

= !(false) || (false)

!(false) = true, so, the expression becomes:

= true || (false)

Lastly, true || false = true

(2) Assume that: a = false and b = true

!(!a || b) || (!a && b)  

= !(!false|| true) || (!false && true)

!false = true, so the expression becomes:

= !(true|| true) || (true && true)

In boolean, true|| true = true and true && true = true. So, we have:

= !(true) || (true)

!(true) = false, so, the expression becomes:

= false|| true

Lastly, false || true = true

<em>This expression is false if a and b have the same value</em>

4 0
3 years ago
The Review feature automatically adjusts to select the edited information.<br> true of false
NNADVOKAT [17]
True I hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • The following function open_file() opens a file called 'example.txt' and returns the file pointer. This function is called withi
    12·1 answer
  • If you want to prioritize downloads of your mobile app instead of visits to your mobile site, you should: a) add a sitelink exte
    10·1 answer
  • What is the primary limitation of free versions of antivirus applications
    14·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • "Find the sum of the squares of the integers from 1 to MySquare, where MySquare is input by the user. Be sure to check that the
    9·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • All of these (except the ______) go unnoticed by the computer
    7·1 answer
  • True or false we can used virus not use pirated software and programs ​
    10·1 answer
  • AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!