1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
10

Which slide elements must claire use to enhance her presentation?

Computers and Technology
2 answers:
Crank3 years ago
6 0

The answer for the 1st blank is text.


boyakko [2]3 years ago
3 0

1. Text 2. audio hope this helps


You might be interested in
What do you call a firewall that is connected to the internet, the internal network, and the dmz?
Firlakuza [10]
<span>Three-pronged firewall hope this helps!</span>
3 0
3 years ago
The two most common mechanisms for sharing an ip address are a router or ____.
Karo-lina-s [1.5K]
ICS would bet he answer. 


Good luck! (:
8 0
3 years ago
Jamal is installing new software and would like a step-by-step guide to teach him how. Which resource would be best, and why?
ratelena [41]
The answer is D because it will explain and show how to install the software.
3 0
3 years ago
Read 2 more answers
(3)(6 Points) During a sale at a store, a 10% discount is applied to purchases over $10.00. Write a program that asks for the am
Galina-37 [17]
I only need point sort
7 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Describe what is meant by the following:
    14·1 answer
  • One megabyte is approximately __________.
    7·2 answers
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • Peter is software designer working at a big software company. He just found out that he has been shifted to their downtown branc
    10·1 answer
  • If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtai
    11·1 answer
  • As u type where does excel display the entry
    10·1 answer
  • ¿Qué es el Internet? ¿Cuál es el protocolo de Internet?
    11·1 answer
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • What is the FaFASA4caster used for
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!