1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
10

A foreign exchange student from Italy is giving a presentation on Italian cuisine to an audience of professional cooks. What is

the best presentation style for this purpose?
an informal one, without the use of visual aids
a formal one, with the use of visual aids
an informal one, with the use of visual aids
a formal one, without the use of visual aids
Computers and Technology
2 answers:
son4ous [18]3 years ago
6 0

Answer:

B.)

Explanation:

I got it right in edge 2020.

vlabodo [156]3 years ago
3 0

Answer:

The answer is B! "a formal one, with the use of visual aids"

Explanation:

I took the assignment and got it correct!

Can I have Brainliest please?

You might be interested in
One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
Thepotemich [5.8K]

Answer:

This explanation is true.

Explanation:

The most common forms of encryption used today are;

  • Data Encryption Standard / DES
  • Triple DES
  • Advanced Encryption Standard / AES
  • Twofish

which are mostly symmetric encryption protocols. They use the same key codes for both parties involved in the communication process.

Asymmetric Encryption is widely used in daily communications that is done over the internet and it uses different keys for each party. The public key encrypts the message and then it is sent over to the recipient. The secret key which they have exchanged is then used the decrypt the message.

I hope this answer helps.

7 0
3 years ago
Jabria are you smart
kiruha [24]

Answer:

A. YESSSSSS

Explanation:

8 0
3 years ago
Read 2 more answers
At year end, Clean123 Inc. has 45500 in cash, 55000 in accounts receivable, 54400 in service equipment, 550 in prepaid insurance
Inessa [10]
Oh ok so yea and why you should but I
8 0
3 years ago
This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
liq [111]

The following code will be used for the PasswordGenerator class.

<u>Explanation:</u>

import java.util.Random;

public class PasswordGenerator {

   private static int passwordsGenerated =0;

   private static Random random = new Random();

   private String prefix;

   private int length;

   public PasswordGenerator(int length,String prefix) {

       this.prefix = prefix;

       this.length = length;

   }

   public PasswordGenerator(int length) {

       this.prefix = "A";

       this.length = length;

   }

   public String pwGen(){

       String pwd= this.prefix+".";

       for(int i=1;i<=this.length;i++){

           pwd+=random.nextInt(10);

       }

       passwordsGenerated+=1;

       return pwd;

   }

   public int pwCount(){

       return passwordsGenerated;

   }

   public static void main(String[] args) {

       PasswordGenerator pw1 = new PasswordGenerator(4,"chs");

       System.out.println(pw1.pwCount());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwCount());

       PasswordGenerator pw2 = new PasswordGenerator(6);

       System.out.println(pw2.pwCount());

       System.out.println(pw2.pwGen());

       System.out.println(pw2.pwCount());

       System.out.println(pw1.pwCount());

   }

}

8 0
3 years ago
Sedimentary rock formation occurs when igneous, metamorphic, or other sedimentary rocks are exposed to the unyielding forces of
Natalija [7]
Deposition is the answer
3 0
3 years ago
Read 2 more answers
Other questions:
  • These are questions from my Computer/Customer Support Class
    6·1 answer
  • What lie does E.D. tell to keep the musical from being canceled? There is a television crew coming to do a story on it. Jake wil
    6·1 answer
  • What is one method that can be used to open the Microsoft Word application?
    8·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • What is the output of the C++ codeabove?
    14·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    13·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • This can change the fit of your respirator. A) A mustacheB) A beardC) Weight gainD) All of the above
    15·1 answer
  • Make variables to represent the length and width of a rectangle, called length and width, respectively. You should set length to
    7·1 answer
  • Who is the best nfl team in your mind
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!