1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
2 years ago
7

(I WILL MARK BRAINLIST) What are the most important things a student should consider when creating a presentation on something t

hey’ve researched for a class?
PLS answer this and have a good day
Computers and Technology
2 answers:
lapo4ka [179]2 years ago
5 0

Answer:

TOPIC

Explanation:

because if you dont have topic you cant create a presentation or a project that you will pass to your class,and if you have a topic present it neatly because you presentation or your project will be graded.

Leya [2.2K]2 years ago
4 0
Hello! I have created many presentations, and have much experience with them. From my experience, I’ve had a lot of success by focusing on the main point (as the first answer was mentioned above), and making eye contact with the audience. Assuming you’re presenting in front of other students and teachers, focus on slowing your words down, as many people tend to talk faster when their nervous. Try using hand gestures, to help you relax and stay focused. Within all this, make sure your presentation has many supporting points and examples to support your main point your getting across. Adding some light humor isn’t a bad thing either (as long as it is on topic) because it lightens the mood, as everything doesn’t have to be extremely serious all the time!
You might be interested in
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
What are the differences between a cursor, insertion point and mouse pointer?​
Anna35 [415]

Answer:

Explanation:

A cursor is a pointer which indicates the position of the mouse on a computer's display monitor.

An insertion point is a location in a document where additional information is inserted when the user begins to type.

A mouse pointer is an image used to activate/control certain elements in a GUI (graphical user interface).

I know you asked for the differences, though i thought I'd add a similarity. All of these 3 things are similar, as they show where the position of the info/mouse is. :)

Hope this helps!

-Biscuit08

7 0
2 years ago
What is the output of the following code snippet? double income = 45000; double cutoff = 55000; double minIncome = 30000; if (mi
MissTica

Answer:

Income requirement is met.

Explanation:

(minIncome > income) will evaluate to false

(cutOff < income) will evaluate to false

the else portion will be executed which is "Income requirement is met"

7 0
3 years ago
Which wireless communication is typically limited to six feet of distance?
Tcecarenko [31]

Answer:

Bluetooth is a wireless communication    is  typically limited to   six feet distances

Explanation:

Bluetooth is one type of communication maximum it covers  10 meters to 30 meters.   but it is one to one communication made for data transactions.  After  25 meters of coverage on communication will be very slow on data transactions. But Bluetooth has also had a limitation.

IR.  It is one of communication where infrared technology used. It is like face to face communication and speed of data transaction limited and it is also one to one communication made for data transactions. Communication paired and covered very little distances.

NFC it is chip-based and covers very little in fact just to device meet each and communication started. And very it caries very little data during the data transactions. it is also one to one communication made for data transactions

RFID is one of communication and it is powerful to cover more areas with multiple connections at the same time. It has a limitation  in distance and it covers  like a net with a specific distance  

4 0
3 years ago
While many instruments have been "electrified", there is no such thing for the drums.
coldgirl [10]
False, because they are called percussion group
4 0
3 years ago
Read 2 more answers
Other questions:
  • Annabella was giving a presentation to a group of 20 real estate agents on
    15·2 answers
  • PPPLLLLEEEEAAASSSSEEEEE HHELLP me.Does anyone know how to copy an image onto a thing so i can post a real question on brainly. b
    8·2 answers
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • To determine what to study, one should first
    8·1 answer
  • Which of these engine components forms a tight seal between the piston and the cylinder and is necessary for proper engine opera
    13·2 answers
  • Tree diagrams are useful for
    12·1 answer
  • Please help I really need it
    7·1 answer
  • Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
    5·2 answers
  • What are the missing whole numbers on this number line? Enter your answers in the boxes. plz show work I'm I need answer 3rd gra
    14·1 answer
  • WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!