1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
4 years ago
5

What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation witho

ut detracting attention from the speaker?
Computers and Technology
1 answer:
tatiyna4 years ago
6 0
Don’t crowd the slide, use images that will grab them audience’s attention, don’t use fonts that are hard to read, make sure your font color can show up on your background color!
You might be interested in
Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
Ray Of Light [21]

Answer:

Microsoft Hyper-V Server

Explanation:

3 0
4 years ago
When a sentinel is used in a (______/posttest) loop to validate data, the loop repeats as long as the input is (valid/______). p
monitta

Answer:

When a sentinel is used in a (pretest/post test) loop to validate data, the loop repeats as long as the input is (valid/invalid).

Explanation:

Required

Fill in the gaps

Sentinel are used to validate or invalidate loops (pretest and post test loops).

Since , some parts of the brackets have aready been filled, we simply complete the blanks with the opposite of the term in the bracket. i.e. the opposite of post test is pretest and the opposite of valid is invalid.

<em>So, the blanks will be filled with pretest and invalid.</em>

4 0
3 years ago
You must lower your high beams when within how many feet of an approaching vehicle?
drek231 [11]

2000 feet of any vehicle

7 0
3 years ago
Write the lyrics toooo.. Saints. Who every gets it correct gets brainliest!<br> No copying
Orlov [11]
I'm sorry but your story isn't adding up
Think your religion is a lie to keep my mouth shut
So I won't testify the crimes you're keeping score of
Why don't you throw me to the wolves? I thought you were one
You were standing there like an angry god
Counting out my sins just to cross them off
Saying that my tongue was too loud to trust
And that my blood couldn't keep you
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
Your revelations don't look nothing like the pictures
You read between the lines and don't stick to the scriptures
You only follow rules if others follow with you
That doesn't sound so holy only playing victim
You were standing there like an angry god
Counting out my sins just to cross them off
Saying that my tongue was too loud to trust
And that my blood couldn't keep you
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
So keep your judgment for someone else, I've had enough
And keep your judgment for someone else, I've had enough
So keep your judgment for someone else, I've had enough
And keep your judgment for someone else, I've had enough
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
6 0
3 years ago
A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
sergeinik [125]

Answer:

A. A nation-state.

Explanation:

Given that a nation-state attack if successful is about having access to the different sector or industries of networks, then followed it by compromising, defrauding, altering (often for fraud purpose, or destroy information

Therefore, in this case, considering the information giving above, the type of malicious actor that is MOST likely behind this attack is "a Nation-State."

7 0
3 years ago
Other questions:
  • Attention merchants define
    5·1 answer
  • What are the two types of computers
    15·2 answers
  • A computer's fqdn is pc42042.east.contoso.corp. which option in the advanced tcp/ip settings dialog box must be enabled to allow
    14·1 answer
  • In which phase of the design process does the developer establish the project goals? A. Design B. Planning C. Development D. Lea
    15·2 answers
  • Help me please thankyou was
    5·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • Which statements identify what astronomers currently know and think will happen with our universe? Check all that apply.
    15·2 answers
  • What are the implications for a company that relies solely on technology to store all of their data ?
    5·1 answer
  • Find the smallest value of n such that LCM of n is 15 is 45​
    5·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!