1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
10

To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
7 0
Use filler words like ummmm, like, so, kinda, or such. Faltering on her words, forgetting things, or not saying things with confidence wouldn't help either. Also, do not loose eye contact with the people even if you only occasionally look up, it makes you look nervous and like you don't know what you're talking about.
You might be interested in
In addition to the decimal number system, the number systems used most often in PLC operationand programming are ________.
otez555 [7]

Answer: PLC uses:

1. Decimal Number system

2. Binary Number system.

3. Octal Number system.

4. Hexadecimal Number system.

5. Binary Coded Decimal Number system.

6. Negative Number system.

7. Number Conversations.

Explanation: The other numbers the Programmable Logic Controller(PLC) uses aside the decimal number system are:

1. Binary Number system.

2. Octal Number system.

3. Hexadecimal Number system.

4. Binary Coded Decimal Number system.

5. Negative Number system.

6. Number Conversations.

7 0
3 years ago
A _______ is used to analyze and summarize your data without graphical support
kkurt [141]
<span>A Pivot table is used to analyze and summarize your data without graphical support</span>
3 0
4 years ago
Read 2 more answers
Which is not covered under the Computer Access Device and Computer Fraud and Abuse Act (CADCFA)? unauthorized use of federal com
Mazyrski [523]

Answer:

The correct answer to the following question is "Typewriters".

Explanation:

CADCFA seems to be the very first provision of federal laws to specifically concentrate on computer assault. These clauses continued to allow corporations to prosecute unjust workers for compensation for the misuse of confidential or sensitive information.

  • Even though we all agree that sometimes a federal worker uses the typewriters in the abundance of power, that's why it's not protected by that same act.
  • The other options are incorrect because they are all known and are covered for that given CADCFA act.
5 0
3 years ago
How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
viktelen [127]
 <span>Packet Tracer introduced dynamic environent management (temperature, gas, pressure, light, ...) to make IoT device simulation more realistic.</span><span>
If a heater is added to a container named branch office and turned on this will affect the packet tracer environment ins the following way:
</span>The temperature inside Branch Office will increase along with any child containers that exist within Branch Office.
6 0
4 years ago
Which components of the​ five-component model is commonly thought of as the​ "bridge" that links the computer side of the model
-Dominant- [34]

Answer:

The correct answer to the following question will be "Data".

Explanation:

  • Data would be any series of one or even more signs which are given significance by unique classification action. To become knowledge the data needs to be interpreted.
  • Data is generally considered to be the "bridge" that connects the designer's machine part with the practical side.

Therefore, this will be the right answer.

3 0
3 years ago
Other questions:
  • How can I get a refund of my money back
    12·2 answers
  • What is SAFFiR? (The robot)
    12·1 answer
  • What can be used to provide a checklist of user tasks that must be included in the interface design?
    6·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
    11·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • Can someone please‼️‼️❗️help me with this?<br> I got an error that I can’t figure out how to fix it.
    6·1 answer
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    9·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!