1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
9

These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th

e audience. Graphics should be used on every slide. Graphics should be used to make a boring presentation interesting. Graphics should be used when they are relevant to the content.
Computers and Technology
1 answer:
kifflom [539]3 years ago
8 0
It's not mandatory to use graphics in every slide. To make a boring presentation interesting, it's not the only option to include graphics but there are other alternatives. Last and the first options seem to be more correct.
You might be interested in
PLS HELP ME!! WILL GIVE BRAINLIEST
Doss [256]
B i think sorry if I’m wrong
5 0
3 years ago
Read 2 more answers
The objective is to write the program that can help you process the database. Your program should be able to (1) display the dat
miskamm [114]

Answer:

;;;;iiiiihhhhhhhhhhhhhhhhhkmbjhv hibv

Explanation:

7 0
4 years ago
A cell's address, its position in the workbook, is referred to as a ________________ when it is used in a formula.
Inga [223]

Answer:

A cell's address, its position in the workbook, is referred to as a <u>cell reference</u>  when it is used in a formula.

5 0
3 years ago
Random.choice will choose a number between 1 and 100. True False​
DaniilM [7]

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Other questions:
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Where do deleted files go?
    7·2 answers
  • Nonverbal messages from the movie it​
    5·2 answers
  • You just installed a new application but users cannot connect to the application remotely. Which feature should be checked to en
    14·1 answer
  • Which user characteristic may not be used to change keyword bids in adwords?:?
    11·1 answer
  • What is the best way to show a complex data chart in word?
    6·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • How to call a void method with no parameters IN JAVA?
    8·1 answer
  • Match each item with a statement below.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!