1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
14

Why is body language an important indicator in business meetings? A. You will be able to communicate more strongly. B. You will

know if your audience is engaged. O C. You will know how you look to your peers. O D. You will be a better oral presenter. SUB​
Computers and Technology
1 answer:
pantera1 [17]3 years ago
6 0

Answer:

you will know if your audience is engaged.

Explanation:

You might be interested in
Assume the integer variable num has been assigned a valid value. What is the purpose of the following code segment?
Pie

Answer:

2

Explanation:

The num%4 operation returns the remainder, so only if num is not a multiple of 4, this value will be non-zero (it will be 1, 2 or 3).

7 0
3 years ago
What is the definition of a flowchart? *
hodyreva [135]

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

Explanation:

8 0
3 years ago
Describe the difference between a myth and a fable.
WINSTONCH [101]

Answer:

A myth is a story about gods and heroes and how the world came into being while a fable is a story about animals, things, and forces of nature that are meant to give a moral lesson. ... “Myth” comes from the Greek word “mythos” meaning “story” while “fable” comes from the Latin word “fabula” meaning “a narrative or tale."

5 0
3 years ago
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow
coldgirl [10]

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

8 0
3 years ago
Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function
MA_775_DIABLO [31]

Answer:

if ((b*b - 4*a*c)<0)

    cout << "no real solutions";

return;

Explanation:

To check if "b squared" – 4ac is negative, we use the expression  if ((b*b - 4*a*c)<0). This expression evaluates the 'bsquared' and substracts '4ac' from it. It then compares the resulting value with zero. if it is less than zero it means it is a negative number, so it executes the statement following cout << "no real solutions"; and returns

8 0
3 years ago
Other questions:
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • Without a(n) ____, a computer cannot function.
    8·2 answers
  • Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the PrintAll member function and a separate cout stat
    14·2 answers
  • Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the sys
    13·1 answer
  • I need help asap please :) I will mark brainliest for whoever gets the right answer! x
    5·1 answer
  • Does anyone know about ICT? i need help ASAP
    9·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • How do you unblock sites on your computer
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!