1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
11

Kathy created a video presentation of her company, which will be shown on a television show as an advertisement. Her company wan

ts her presentation to be shown when most viewers will be watching television. When should the presentation (advertisement) be showcased on television? A. streamtime B. run-time C. prime time D. airtime E. build time
Computers and Technology
1 answer:
Elanso [62]3 years ago
8 0

Answer:

C. Prime Time

Explanation:

Kathy has to choose the time on which the TV will have the highest audience watching the TV.

Prime Time is the time on TV at which the audience in front of TV or on radio is expected to be highest. So in order to get the most viewers, the presentation should be showcased on television in Prime Time.

So,

Option C. Prime Time is the correct answer..

You might be interested in
var shirt = "blue"; 2. var pants = "gray"; 3. var clothes = wearIt(shirt, pants); 4. function wearIt( x, y) 5. { 6. var myOutfit
pogonyaev

Answer:

Arguments: "blue" and "gray"

Parameters: x and y

Explanation:

In programming, a function can take zero or one or more than one input values. These input value will be held by the variables which are called parameters. In this code snippet, x and y are parameters of wearIt function.

On another hand, when calling a function, we provide the values to the function and the values provided are termed as arguments. In this case, we provide the string blue and gray which are held by shirt and pants variables respectively to the function wearIt. The string "blue" and "gray" will then be passed to parameter x and y which will be processed in the function.  

4 0
4 years ago
In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
katen-ka-za [31]

Answer:

Web server

Explanation:

4 0
3 years ago
Abby is creating a professional development plan to advance in her current career. She has identified what job she wants and wha
Andre45 [30]

Evaluate her current skills and identify areas of improvement

5 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
an images scanned from a CD cover does not have to be cited because you didn't find the image on the internet True or false
ruslelena [56]

Answer:

False

Explanation:

When searching on the internet, I found flashcards containing this information.

6 0
3 years ago
Other questions:
  • Different between ocular and compound miscroscope
    13·1 answer
  • The stack ADT may be implemented with
    13·1 answer
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • How to write a program converting RGB to CMYK in python
    6·1 answer
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • What is data anayltics
    5·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • Write a program to find the principle amount​
    10·1 answer
  • A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a ___
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!