1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
2 years ago
11

What are your considerations in making a derivative ict content ti effectively communicate or present data or information?

Computers and Technology
1 answer:
Sever21 [200]2 years ago
7 0

Answer:

1) Design

2)Content

Explanation:

The considerations in making a derivative ICT content to effectively

communicate or present data or information include the Design.

The design is what helps to portray and make the content more appealing and appropriate for the end users.

The content is the main body and it is vital in helping to provide the required information.

You might be interested in
The item in this illustration that is highlighted is the _____. quick access tool bar view buttons status bar zoom control
tiny-mole [99]

Answer: scrollbar

Explanation:

7 0
3 years ago
Read 2 more answers
To save a presentation, tap or click the save button on the Blank
frozen [14]
If this is a true or false statement then the answer is true unless you have it on automatic save 
4 0
3 years ago
Choose the missing term.
qaws [65]

Answer:

import

Explanation:

the <em>import </em>keyword is used to import external modules into a python script.

6 0
2 years ago
Choose all the items that represent potential ways to find a job opening.
NeX [460]

Answer:

company website

Explanation:

4 0
2 years ago
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
3 years ago
Other questions:
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • Plz help ASAP
    10·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • How do you respond to an email?
    6·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • Which view would you need to use to make
    14·1 answer
  • Help plz
    10·1 answer
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • Why are men more exposed to mass media?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!