1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
6

When using presentation aids A. make the aid available for the audience to look at throughout the speech. B. prepare to give you

r presentation without the aids, in case problems arise. C. Look at the presentation aid when you are explaining it to the audience. D. Practice without the aid and work it in only during the last rehearsal.
Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
6 0

Answer: options A and B.

Option A, make the aid available for the audience to look at throughout the speech.

Option B, prepare to give your presentation without the aids, incase problem arises.

Explanation:

Presentation aids, sometimes also called sensory aids, are the resources beyond the speech itself that a speaker uses to enhance the message conveyed to the audience.

The type of presentation aids that speakers mostly make use of are visual aids; pictures, diagrams, charts and graphs, maps... Audible aids (musical excerpt, sound effects) and olfactory aids (fragrance samples or food samples) are also used.

* Presentation aids can be used throughout the speech but it should be used for essential points so as to to tire or bore the audience.

* Ensure presentation still works without the presentation aids in case of technical problems or if any problem arises at all.

* While explaining the aids, focus should be on the audience and not the presentation aids itself.

* Practice should be done with the presentation aids in advance so as to avoid any error while presenting.

Therefore, options A, B should be done when using presentation aids.

You might be interested in
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
What is printed by the following program? var isRaining = false; var isCloudy = false; var isSunny = !isRaining && !isCl
hram777 [196]

Answer:

The output to this given question is "Is it warm: true".

Explanation:

In this question firstly two-variable defines that are isRaining and isCloudy. In those variables assign false value. Then we define another variable that is isSunny. In isSunny variable, we check condition that is if variable isRaining not AND (logical gate) variable isCloudy not equal to isSunny. The AND logical gate is used to check that both condition is true or not. Then we define another variable that is isWarm. In this variable, we check condition if isSunny OR (logical operator) isSummer is true. The OR operator is used to check in both value if one condition will true it will print true. At the last will print the value.

8 0
3 years ago
Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the
Leno4ka [110]

Answer: String[]Breeds = new String[100]

5 0
3 years ago
Each generation is set apart from the previous generation because of an innovation.
ehidna [41]

Answer:

Second Generation: transistors

Third Generation: integrated circuits

First Generation: vacuum tubes

Explanation:

Generations of computers are categorized based on the technologies that were used in them.

Given innovations or technologies are:

<u>transistors :</u>

Transistors were introduced in the second generation in place of vacuum tubes.

<u>integrated circuits :</u>

Integrated circuits were introduced in the third generation. An IC consists of multiple transistors.

<u>vacuum tubes:</u>

The very first generation of computers used vacuum tubes to do the calculations. the only drawback was that the tubes used to heat up very soon.

Hence,

Second Generation: transistors

Third Generation: integrated circuits

First Generation: vacuum tubes

3 0
3 years ago
Describe and evaluate the working memory model of memory (16 marks)​
Lyrx [107]

Answer: The working memory model is a cognitive model of short term memory comprised of three main components; the central executive, the visuo-spatial sketchpad and the phonological loop. ... they suggests the components of working memory all have limited capacity.

5 0
3 years ago
Other questions:
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
    5·1 answer
  • Which is true about SSH and Telnet?
    6·1 answer
  • Is this statement true or false?
    11·1 answer
  • If you want to change the name or file type of an existing word processing document, what command should you use?
    11·2 answers
  • In C++ please.
    8·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • How can you have internet without subscribing to cable?
    13·1 answer
  • Do small companies need computers? why?<br>​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!