1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
7

What are the physical aspect of a presentation​

Computers and Technology
1 answer:
mina [271]3 years ago
8 0

Answer:

1. It has a clear objective.

2. It's useful to your audience.

3. It's well-rehearsed.

4. Your presentation deck uses as little text as possible.

5. Your contact information is clearly featured.

6. It includes a call-to-action.

Explanation:

You might be interested in
Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
galben [10]

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

4 0
3 years ago
Which of the following is not a group of energy sources?
Dimas [21]

Answer:

nonrenewable

Explanation:

Brainliest please

4 0
3 years ago
Read 2 more answers
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
3 years ago
1. Comments can be placed anywhere in Python, including in the middle of a line of code.
viva [34]

Answer:

This is true

Explanation:

Comments don't effect your program at all.

The computer doesn't even read the line with the comment, what you right before the comment tells the computer to skip this line.

So you can place them anywhere

6 0
4 years ago
Other questions:
  • Which symbol is used to separate a worksheet name from a cell reference?
    10·1 answer
  • Paragraph on how atms work
    15·1 answer
  • Corona and app inventor can be used to develop ________.
    10·1 answer
  • Which extension is appropriate for Word document templates?
    10·2 answers
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examines system components
    8·1 answer
  • The _____ option will require users to have a password to access the document.
    10·2 answers
  • Data is?
    15·1 answer
  • TRUE/FALSE. a good with many close substitutes is likely to have relativelyelastic correct demand, since consumers can easily ch
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!