1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
11

Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi

ch of the following is the best approach she could take?
a.
She could begin with a funny story about her adventures as a young girl digging up worms with her father and all the wonderful things he taught her about gardening.
b.
She could give a lengthy and detailed lecture about all the major gardening techniques and show several graphs demonstrating the benefits of cultivating earthworms.
c.
She could bring in actual worms for the audience to handle and observe, and actual soil samples for them to touch and smell.
d.
Both a. and c. would be effective approaches for Sharon to take.
Computers and Technology
2 answers:
SVEN [57.7K]3 years ago
6 0

Answer:

I put A

Explanation:

Lubov Fominskaja [6]3 years ago
4 0

Answer:

D

Explanation:

edg2021

You might be interested in
Which statement reflects inherent bias in reading and learning about our world?
love history [14]
I had to look for the options and here is my answer:

The statement that best illustrates what inherent bias is at is is used in reading and learning about the world is this: "<span>Historians are interpreting the past." Definitely, historians do not interpret the past, but rather their field focuses on gaining facts and information related the past.</span>
8 0
3 years ago
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
abruzzese [7]

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

  • an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input.
  • It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So,<u> LDAP injection</u> is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

4 0
3 years ago
How can you ensure that your web pages are compliant with a w3c standard?
miss Akunina [59]
Use a code validation tool.
6 0
3 years ago
Which type of address defines a single network interface in a computer or other device?
White raven [17]
MAC address
......... ..
4 0
3 years ago
What does CPU stand for
nata0808 [166]

Answer:

Central Processing Unit

Explanation:

Principle part of any digital computer system

6 0
2 years ago
Other questions:
  • WHEN COPYING EXISTING SPREADSHEET DATA TO A WORD DOCUMENT YOU NEED TO SELECT?
    12·1 answer
  • This question is for one of my classes I am in right now, and the question is:
    8·1 answer
  • Productivity can best be described as:
    5·2 answers
  • Finish the statement below to correctly describe the Defense Enrollment Eligibility Reporting System (DEERS). DEERS is a central
    6·1 answer
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • Cine stie repede va rog mult si repede
    9·1 answer
  • What is the definition of trouble shooting.
    12·1 answer
  • What starts with p and ends with orn
    15·2 answers
  • What free website can you record videos on, and edit them without money?
    5·2 answers
  • Name 3 things that you use daily that are considered computers?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!