1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
9

What are the key components to planning a presentation?

Computers and Technology
2 answers:
Katarina [22]3 years ago
5 0

1,3,4,7 just took on edge

pishuonlain [190]3 years ago
4 0

Answer:

1 3 4 7

Explanation:

You might be interested in
. What part of the communication feedback loop results in unclear communication? A. Sender's message B. Interference C. Message
MakcuM [25]
D is ur final answer i hope i helped
7 0
3 years ago
Read 2 more answers
Just answer the 2 questions. THX
pogonyaev

Answer:

A then D

Explanation:

3 0
3 years ago
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
4 years ago
Given three variables, a, b, c, of type double that have already been declared and initialized, write some code that prints each
Olegator [25]

Answer:

The following code from the C++ programming Language:

cout << setw(10) << setprecision(3) << scientific;

cout << a << " " << b << " " << c;

Explanation:

In the above code, we have three double type variable "a", "b", "c" which already have been declared and initialized.

E-notation is how we write any number that is too small and too large to be in briefly written in decimal format.

6 0
4 years ago
I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
ipn [44]

Answer:

cool

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
    13·2 answers
  • Many people use Wikipedia as a reference for computing papers, and getting additional information about a topic. How reliable is
    15·1 answer
  • Plzzzzzzz help good answers only and best answer gets brainly
    5·1 answer
  • What was the second phone made in the world called?
    5·1 answer
  • Katherine wants to open a bank account that allowed her to perform frequent transactions without being charged a penalty and she
    14·1 answer
  • In Java please.
    13·1 answer
  • According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
    13·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • : Compute the 9 partial derivatives for the network with two inputs, two neurons in
    12·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!