1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
8

Which strategies for effective presentations is Ian using in his opening? Check all that apply.

Computers and Technology
2 answers:
Fofino [41]3 years ago
5 0

Answer:

A. using a hook in his opening

B.  detailing the speech’s objectives

E. letting his audience know what to expect

Explanation:

Opening his speech using a quotation is a strategy of using a narrative hook, or simply hook, by Ian. Giving a grand and enticing opening is what makes an audience to pay attention and listen to what the speaker has to say in his speech. So, first strategy used by Ian is using a hook in his opening.

Another strategy used by Ian is giving objective details of his speech. By outlining what he will be covering in his speech, Ian is letting his audience know what to expect from the speaker and his speech, and also gave details of his speech.

So, option A, B, and E are correct.

Anastaziya [24]3 years ago
5 0

Answer:

A, B , E !

Explanation:

You might be interested in
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer,
julia-pushkina [17]

<u>Organizations monitor, retain, and review employees emails:</u>

Today’s digital world most of business runs through employee emails. In an organization monitoring the email is most important event for security purpose and keep necessary backup so that it can be restore at any given point of time. If an organization is not monitor employee’s email system or server, then the organization is high risk.

As policy of an organization monitor employee’s email is must and watched carefully. Any important document is leaked or forwarded to wrong email address, then is high risk for an organization

As policy has to be drafted and signed by employee of an organization.

7 0
4 years ago
Hey guys... I know this is homework question but I need to see other opinions.. Should I get the Apple iPad Air or the Apple iPa
RSB [31]
You should get the 8th generation
6 0
3 years ago
You should always buy the biggest camera bag that you can find for extra equipment
zysi [14]
False bbfderaddfdffffgfgdhgft
5 0
4 years ago
Read 2 more answers
What type of device is characteristic of an enterprise environment?
Nitella [24]
A workstation used at an engineering firm.
8 0
4 years ago
You have a motherboard with 4 built-in sata connectors. what is the maximum number of sata devices you can connect to the mother
sergey [27]
4 sata devices because there are only 4 sata connectors
7 0
4 years ago
Other questions:
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
    10·2 answers
  • In the movie Charlie and The Chocolate Factory, why did Augustus Gloop go against Mr. Wonka’s instructions and drink from the ch
    15·1 answer
  • And Python code for the following programming problem and the pseudo code below
    5·1 answer
  • Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has download
    6·1 answer
  • ¿Qué diferencia existe entre un virus biológico y virus informático?
    12·1 answer
  • can you follow my ikok? its that_enby_skye and my youube Cactus Face with 241 subscribe er s &amp; my twith Mx_Skye
    10·2 answers
  • PT8 what does the word " fossil " mean
    11·2 answers
  • Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
    12·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!