1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
3 years ago
7

(I WILL MARK BRAINLIST) What are the most important things a student should consider when creating a presentation on something t

hey’ve researched for a class?
PLS answer this and have a good day
Computers and Technology
2 answers:
lapo4ka [179]3 years ago
5 0

Answer:

TOPIC

Explanation:

because if you dont have topic you cant create a presentation or a project that you will pass to your class,and if you have a topic present it neatly because you presentation or your project will be graded.

Leya [2.2K]3 years ago
4 0
Hello! I have created many presentations, and have much experience with them. From my experience, I’ve had a lot of success by focusing on the main point (as the first answer was mentioned above), and making eye contact with the audience. Assuming you’re presenting in front of other students and teachers, focus on slowing your words down, as many people tend to talk faster when their nervous. Try using hand gestures, to help you relax and stay focused. Within all this, make sure your presentation has many supporting points and examples to support your main point your getting across. Adding some light humor isn’t a bad thing either (as long as it is on topic) because it lightens the mood, as everything doesn’t have to be extremely serious all the time!
You might be interested in
How does net neutrality affect consumers actovate in a a positive way?
Lerok [7]

Answer:

Net neutrality prevents ISP's from treating internet communications differently. In that your ISP cant discriminate or charge differently based on user, content,website,platform,address or method of communication.

3 0
3 years ago
What is a Forloop and what is it used for?
anastassius [24]
It is used to repeat any block of code multiple times (iteration)
6 0
3 years ago
Read 2 more answers
Definition of laptop
zaharov [31]
A device that sucks bc mien broke
7 0
3 years ago
Read 2 more answers
How did machines get involved throughout the years?
Nataliya [291]

Answer:

Although the primary goal of a political machine is keeping itself in power rather than providing good government, machines have been responsible for restructuring city governments to centralize authority, improving facilities and services, helping to assimilate immigrant groups, and encouraging the growth of business and industry. Supporters of political machines say that they “work” and that consolidating power in the hands of a boss.

Explanation:a political machine is a political group in which an authoritative leader or small group command the support of a corps of supporters and businesses

4 0
3 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Other questions:
  • Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
    11·1 answer
  • Can someone help me, please
    7·1 answer
  • software that provides capabilities common across all organizations and industries is known as ________ software.
    15·2 answers
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • PLEASE HELP WITH MY CODING!!!!!!!!!!!!!!
    7·2 answers
  • Ling has configured a delegate for her calendar and would like to ensure that the delegate is aware of their permissions. Which
    13·2 answers
  • PLEASE HELP <br> Which of the following best describes the existence of undecidable problems?
    7·1 answer
  • HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
    14·1 answer
  • Python Programming
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!