1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
9

Which software application should be used to create a sales pitch to a group of people? Database Email Presentation Word process

ing
Computers and Technology
1 answer:
Bogdan [553]3 years ago
7 0
Hello,

The answer is option C "presentation".

Reason:

The answer is option C presentation because presentations are used in order to show businesses sales pitch or there products in order to get a investment.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
You might be interested in
A(n)_______ is malware that arrives in a trojan, disguised as legitimate software, and then sets up a(n) that provides unauthori
soldi70 [24.7K]

The RAT-Remote Access Trojan is a kind of malware that allows unauthorized access to your devices.

Explanation:

The Remote Access Trojan is a kind of malware that is similar to legitimate software programs. It allows unauthorized users to control your computer without your permission. Hackers will attach the RAT with documents like email, any software’s or games. It is difficult to identify RAT than any other viruses or malware. Antivirus software can able to prevent attacks from RAT like malware and act as extra security to your devices.

4 0
3 years ago
Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
vampirchik [111]

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

<h3>What is IPv6?</h3>

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

brainly.com/question/5296366

#SPJ1

4 0
2 years ago
Helpppppp please I will give branliest or something please help ​
Allisa [31]

OK you don't be sad it is always free

7 0
3 years ago
Which XP practice prescribes that "the code [always be] written by two programmers at one machine"?.
damaskus [11]

Answer:

Pair Programming

Explanation:

In Extreme Programming XP, pair programming is a practice in which two programmers work together in a pair at one machine, when writing a code.

One of the two programmers is called the "driver" or developer who writes the code and supervises all the changes made to the program.

The other one is called an "navigator" or observer who provides ideas on how the program should be written, observes or reviews it the program, identify the issues or errors in the code, help in code simplifications.

The two developers implements the program, do coding, review the program and check each other's work. They both are required to be equally skilled in order to implement and test the code. This improves the process of the software development. By working in a pair and reviewing and testing the code together, they develop a better code.

8 0
4 years ago
Which of the following might be appropriate to be created as a constant variable?
jasenka [17]

Answer:

Number of feet in a mile

Explanation:

In this problem, we need to find an option that to be created as a constant variable.

In option (a) "number of feet in a mile".

As 1 mile = 5280 foot

The number of feet in a mile is constant in every condition.

In option (b), (c) and (d)

number of people inside a store , current grade in a class , score in a football game are no fixed. It is not created as a constant variable.

Hence, the correct option is (a).

7 0
3 years ago
Other questions:
  • What company handles security for a lot of the e-commerce on the internet and also maintains two root name server clusters?
    8·1 answer
  • Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what wi
    14·2 answers
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • )the number of levels in a tree is called
    6·1 answer
  • Olivia started working last year. By April 15th, she will need to prepare and send the Federal government _____.
    15·2 answers
  • Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
    11·1 answer
  • Draw any five (5) basic symbols used for flowcharting
    14·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    10·1 answer
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • To stored three characters a computer occupies. Bytes memory space
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!