1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
9

These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th

e audience. Graphics should be used on every slide. Graphics should be used to make a boring presentation interesting. Graphics should be used when they are relevant to the content.
Computers and Technology
1 answer:
kifflom [539]3 years ago
8 0
It's not mandatory to use graphics in every slide. To make a boring presentation interesting, it's not the only option to include graphics but there are other alternatives. Last and the first options seem to be more correct.
You might be interested in
The ________ of the operating system enables users to communicate with the computer system. Select one: A. user interface B. mod
Mumz [18]
The user interface of the operating system
8 0
3 years ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
Question 17 (3 points)
Archy [21]

Answer:

#

Explanation:

6 0
3 years ago
Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. redirecting users to
sweet-ann [11.9K]

Answer:

Explanation:

Pharming involves redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. An individual can accomplish this by changing the hosts file of the web address that the user is trying to access or by exploiting a DNS server error. Both of which will allow the individual to convince the victim that they are accessing the website that they were trying to access, but instead they have been redirected to a website that looks identical but is owned by the individual. The victim then enters their valuable and private information into the website and the individual can see it all and use it as they wish. Usually, this is done to steal banking information.

7 0
3 years ago
How do you change your name on this website?
Dominik [7]

Answer:

Well you mean app and yo look at the bottom of your screen and there is 3 icons and press the one that says me then press edit and thats how u do it

4 0
3 years ago
Read 2 more answers
Other questions:
  • William has an internet connection that does not allow him to make calls when connected to the Internet. What internet service c
    8·2 answers
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
    10·1 answer
  • Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the pro
    5·1 answer
  • Exercise#3: Write a ch program that performs the following: Declare a two arrays called arrayA and arrayB that holds integer and
    6·1 answer
  • How would you describe the difference between a syntax error and a logic error?
    13·2 answers
  • What year did the first hovercraft sail on water
    15·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!