1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
3 years ago
14

Franklin gave a presentation without any help from others. He didn't smile, and he looked at the floor during the presentation.

What could Franklin have done to improve his presentation?
a Added more images to his slides to add engagement
b Asked for someone else to do the research for him
c Practiced in front of a trusted adult and asked for feedback
d Read the information right from the slides
Computers and Technology
1 answer:
satela [25.4K]3 years ago
8 0

Answer:

C. Practiced in front of a trusted adult..

You might be interested in
The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
Flura [38]

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

5 0
3 years ago
What is the process called that determines how bits are represented on the medium?
Bad White [126]
The process that determines how bits are represented on the medium is called encoding. It is the process of converting a certain data into a particular format that is required for a certain processing need like program execution, data transmission or file conversion.
3 0
3 years ago
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
Ray Of Light [21]
I choose Home and it’s a good thing to have
5 0
3 years ago
An inserted Graphic in Excel
Aneli [31]
Inserting<span> Clip Art. Choose the location where you want to </span>insert<span> the clip art. You can </span>insert<span> clip art in any worksheet cell or in the header or footer. To select a header or footer in </span>Excel<span> 2003, select "Page Setup" from the File menu and then click the Header/Footer tab on the Page Setup dialog.</span>
4 0
3 years ago
What is the purpose of the domain name?
Aloiza [94]

Answer:

Purpose. Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols.

6 0
3 years ago
Other questions:
  • Write a program which selects two integer numbers randomly, adds the numbers and asks the user to enter the answer and then chec
    13·1 answer
  • How do i divid 521 to the nearest tenth
    12·2 answers
  • CUANTO ES DOS MAS DOS POR FAVOR URGENTE :V
    10·2 answers
  • In a single statement: declare, create and initialize an array named a of ten elements of type int with the values of the elemen
    9·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • a paragraph is a segment of text with the same format that begins when you press the enter key and ends when you press enter key
    6·2 answers
  • Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks, tape, or optical media.
    9·1 answer
  • When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
    9·1 answer
  • Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for w
    7·1 answer
  • If the middle number is lesser than the candidates then u eliminate the ___ half of the data​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!