1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
2 years ago
8

All of the following are methods to improve the communication of your key messages EXCEPT:

Computers and Technology
2 answers:
uysha [10]2 years ago
6 0

Answer:

Fill the slides with images and animations

Explanation:

these will most likely distract the audience

Setler [38]2 years ago
3 0

<u>Answer:</u>

<em>Fill the slides with images and animations </em>

<u>Explanation:</u>

<em>Focus on the necessary points during a communication</em> really helps well so that the receiver receives it in the right way.

<em>Putting questions in equal interval</em> or whenever necessary will help the presenter in attracting the attention of the audience which <em>improves communication </em>

Including related humorous story is essential because it <em>communicates ideas with fun </em>

<em>Filling the slides with images is not going to help if it is not related to the topic that has been taken for discussion. But if it is</em><em> related slides then this is valid. </em>

You might be interested in
Explain the difference between social engineering and reverse social engineering.
san4es73 [151]
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.

Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
5 0
3 years ago
Which of the following is a good precaution to take when making online purchases? (1 point)
Fantom [35]

Answer:

A.

Explanation:

A is the answer..

This is because you can use a private browser for safety precautions so no hackers would target you and steal your personal information. Also the other options make no sense at all. Option B states that you can use the same strong password for all online accounts and that's not good. It's not recommended because hackers or other people on the dark web can hack into your accounts and steal your data. Option C states that you must make sure http: and an open padlock displays on the address bar. This means that your connection is insecure and people can track you down. Option D is a good thing to do but option A is the best option overall. It's the right step to take when making online purchases <3

5 0
2 years ago
A security administrator is required to submit a new csr to a ca. what is the first step?
m_a_m_a [10]
If an administrator needs to renew a certificate for a web server he/she should submit the CSR (Certificate Signing Request) to CA.
<span>If a security administrator is required to submit a new CSR to a CA, teh fisrt step the administrator should do is to g</span>enerate a new private key based on RSA.
4 0
3 years ago
One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
Mademuasel [1]

Answer:

Explanation:

There are different advantages to buy commercial software like:

- Is a system used for other companies, we will have good referents with the feedback of them.

- Support, we should have support twenty-four hours, if a system doesn't have good support, we must not buy the software.

- We can choose software with a lower initial cost, this depends on our needs.

3 0
2 years ago
If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
sladkih [1.3K]
Have them post more positive outcomes and help them understand that what they post stays there forever
4 0
2 years ago
Read 2 more answers
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • . When you create a template class, ___________.
    15·1 answer
  • What was the first browser that allowed for graphics to be viewed on the web?
    14·2 answers
  • Which segment of society introduced the grunge look?
    5·2 answers
  • Privacy settings allow account owners to decide who can ........
    12·2 answers
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
  • Identify and state the value of hardware components​
    12·1 answer
  • Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!