1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
8

When creating an electronic slide presentation, Lee should avoid

Computers and Technology
1 answer:
Amanda [17]3 years ago
5 0

I believe the answer is <u>Using sound effects between slides.</u>

Using sound effects between slides can cause for a distraction, and if you are in college, your professor may not score your presentation as well as if it were made without sound effects. Hope this helps!

You might be interested in
URGENT!!!! WILL GIVE BRAINLIEST Select the correct answer. Jason works as a graphic designer. He has been tasked with creating a
Verdich [7]

Answer:

ur answer is a

Explanation:

3 0
3 years ago
Read 2 more answers
Write a function in Java that takes in the int[] array, sorts it using bubble sort, then returns back the sorted array. Examples
Vlad1618 [11]

Answer:

static int [] bubbleSort(int[] arr) {  

       int n = arr.length;  

       int temp = 0;  

        for(int i=0; i < n; i++){  

                for(int j=1; j < (n-i); j++){  

                         if(arr[j-1] > arr[j]){      

                                temp = arr[j-1];  

                                arr[j-1] = arr[j];  

                                arr[j] = temp;  

                       }      

                }  

        }

        return arr;  

   }  

Explanation:

Above function is written in java language in which it takes integer array then sorts it using bubble sort and return back the array. The function has return type int[] which is necessary for returning array of type integer. The variable n contains the size of array which is calculated through  array's length method which is built in. Above function sorts array in descending order if you want to sort it in ascending order just change the condition of in if branch from <em>"</em><em>if(</em><em>arr[j-1] > arr[j]</em><em>)</em><em>"</em> to <em>"</em><em>if(</em><em>arr[j-1] < arr[j]</em><em>)</em><em>"</em> means replace > sign with < sign .

6 0
3 years ago
Please help me please with this subject
saveliy_v [14]

Answer:

heading styles

Explanation:

hope you get it

3 0
3 years ago
Read 2 more answers
Match the following:Part A1. Engine that searches Web pages in its database that contain specific words or phrases 2. Service th
dybincka [34]

Answer:

1: General search, 2: Online reference, 3:Speciality Search, 4: Metasearch engine, 5: Social search tool.

Explanation:

General search engine are internet portals for searching numerous compiled resources for specific key words or phrases. examples are Google and Bing.

Online references are virtual  reference that connect you to professional librarian over the internet.

Specialty search engine searches special created database for particular subject and they are also refer to as topical search engines.

Metasearch engine this kind of search engine uses other search engine to provide his own result.

Social search tool provide  content that are social media related.

4 0
3 years ago
Authentication technologies are used by many organizations to _____.
sasho [114]

Answer:

C. confirm the identity of a user requesting access to information or assets

Explanation:

Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. Authentication is used to secure data and ensure access is given to an authorized user. There are four main types of authentication technologies that can be used in an organisation. The first one is the password-based technology where a user provides a user id and a password to gain access to information. There is also a certificate-based technology which uses digital certificates to authenticate users. The third technology is the E-Token Based authentication where a device generates a random number whenever it is used, the number generated can be used in place of a password. The fourth alternative is biometric technology , which identify users by their physical characteristics such as their fingerprints, voice or facial features.

6 0
3 years ago
Other questions:
  • The wireless spectrum, as defined by the fcc, spans between which two frequencies?​
    7·1 answer
  • I need some good roblox games suggestions. Since brainly only lets two answer, please answer in the commments. :)
    6·2 answers
  • Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total
    9·1 answer
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race:
    7·1 answer
  • . Complete the code, drawing a line between points (100, 200) and (34, 67)
    7·1 answer
  • About twice a day my Chromebook blacks out. why does it do that?
    8·2 answers
  • the guest would like to convert his 100 dollar to peso.How much will the guest receive if the exchange rate is 1 dollar=Php 50.5
    11·2 answers
  • Select the correct navigational path to sort data using multiple levels.
    6·2 answers
  • When a computer is infected by a virus, _______.
    14·1 answer
  • If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!