1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
12

Melissa and Sue want to show a presentation to twenty employees using a presentation while using a projector. They learn that th

e projector is not working, they should
A) Cancel the meeting until the projector is fixed
B) Print the presentation give each person a hardcopy
C) copy and paste the information from the document into a spreadsheet and send it
or D) Ask the employees to stand around Sue's laptop to watch
Let me know as quickly as possible this is an exam!!!!! thx :)
Computers and Technology
2 answers:
djyliett [7]3 years ago
7 0
B) print the presentation to give each person a hard copy so everyone can look at the same slides while being presented
postnew [5]3 years ago
6 0
C maybe ? I’m not positive about that though so sorry if I’m wrong
You might be interested in
A _____ is a type of legal protection for which person can apply to protect an invention or a discovery.
shepuryov [24]

Answer:

patent

Explanation:

A patent is an intellectual property, with this legal protection, we can exclude to use, sell, and importation of an invention for a limited period of years, but we must do an enabling public disclosure of the invention or discovery, it is a requirement of the patent law, a patent is considered an advantage in the industries world.

3 0
3 years ago
____ are types of changes that occur when text has been omitted from a document and must be inserted later.
VMariaS [17]
You already wrote the answer. It is Additions
7 0
3 years ago
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
DIA [1.3K]

Answer: i’m thinking it’s reviewer

Explanation:

4 0
3 years ago
Read 2 more answers
how can i stop this stupid thing from sending me emails because my school decides to not give you a block option
tekilochka [14]

Answer:

If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.

5 0
3 years ago
Read 2 more answers
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class ContestResult containing: An data member winner of type string, initialized to the empt
    14·1 answer
  • Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
    6·1 answer
  • As a compositional mode for electronic? media, __________ help people find their way through an unfamiliar system or? subject; t
    7·1 answer
  • Why do contour lines never cross?
    5·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • Write the definition of a method twice, which receives an integer parameter and returns an integer that is twice the value of th
    14·1 answer
  • A network with 6 bits remaining for the host portion will have how many usable hosts?​
    9·1 answer
  • What term is used to refer to the merging of government services with information technology?
    11·1 answer
  • Which tab on the Ribbon contains the command to print a publication?
    10·1 answer
  • Write a function named “createPurchaseOrder” that accepts the quantity (integer), the cost per item(double), and the description
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!