1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
5

Travis is getting ready to present his PowerPoint slides to his class. What is a good tip Travis should use during his presentat

ion? Make eye contact and smile. Read from the slides. Speak quickly. Speak quietly.
Computers and Technology
1 answer:
Margaret [11]3 years ago
5 0

Answer:

REad from slide and speak clearly and slowy.

Explanation:

You might be interested in
Which tools is used to bundle cables neatly inside and outside of a computer?​
Ugo [173]

Answer:

Cable Ties

Explanation:

6 0
3 years ago
Digital manufacturing has impacted our world today! List a reasons why.
Maru [420]
Because we can get manufacturing faster than usual
6 0
3 years ago
The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
MrRa [10]
<span>The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and the long run, is called a production function.

Hope I helped ;)
</span>
3 0
3 years ago
An image can be copied from the Internet or another location and pasted into Paint.
Furkat [3]
It is true. You can copy and paste a picture into microsoft paint, using either the right click task bar or Ctrl c-ctrl v, you can then adjust the image to the desired size.
5 0
3 years ago
What has a code that is freely available for use or modification?
liq [111]

Answer:

Open source software

Explanation:

Open source software is exactly what you think it is, the code to compile the software and run it is available to the public for use or modification.

6 0
3 years ago
Other questions:
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Apakah ada yang bisa menjelaskan potongan source code ini?
    15·1 answer
  • Different search engines available on the internet​
    7·1 answer
  • What influences my school my church and my leader on my society​
    8·1 answer
  • What the central difference between negative and positive politeness?
    13·2 answers
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
  • How is a transaction verified on a cryptocurrency network?.
    14·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!