1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
6

Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da

rkening the background color by reducing the amount of text in each bullet
Computers and Technology
2 answers:
Hoochie [10]3 years ago
7 0

Answer:

<em>A. by reducing the number of visual aids</em>

Explanation:

I hope this is correct.. i took the test on edge and the first time that I did I got this question wrong because I chose C. If anyone takes this test and chooses A, tell me if it's correct.

I hope this helps! :)

azamat3 years ago
5 0

Answer:

b.  by providing more information

Explanation:

You might be interested in
A device capable of copying a graphic, document, or other object is called a
Amiraneli [1.4K]
A printing press or printer
5 0
3 years ago
Read 2 more answers
Which of the following is an example of tangible property?
lyudmila [28]
<span>B an idea for an invention that your dad mentioned briefly but did not write down</span>
8 0
3 years ago
Mention any four features which a standard computer laboratory should have​
Vera_Pavlovna [14]

Answer:

•Make sure doorway openings are at least 32 inches wide and doorway thresholds are no higher than 1/2 inch.

•Keep aisles wide and clear for wheelchair users.

•Make sure all levels of the lab are connected by a wheelchair-accessible route of travel.

For students with mobility impairments, make sure there are procedures in place for retrieving materials that may be inaccessible.

Make sure ramps and/or elevators are provided as an alternative to stairs. Elevators should have both auditory and visual signals for floors. Elevator buttons should be marked in large print and Braille or raised notation and easily reachable for wheelchair users.

Locate the lab near wheelchair-accessible restrooms with well-marked signs.

Service desks need to be wheelchair-accessible.

Provide ample, high-contrast, large-print directional signs throughout the lab. Mark equipment in the same fashion.

Provide study carrels, hearing protectors, or private study rooms for users who are easily distracted by noise and movement around them.

Provide at least one adjustable-height table with easily reachable controls for each type of computer.

Have wrist rests available to those who require extra wrist support while typing.

Keep document holders available to help users position documents for easy reading.

5 0
3 years ago
Read 2 more answers
Which printout will result from the snippet of code?
Anna35 [415]

Answer:

These are the supplies in the list:  

[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Explanation:

The line return (\n) character will be in the output (so there will be a change of line), but it will NOT be visible as it would have been interpreted as a special character.

So the output will be on 2 different lines, with no \n visible.

If the command would have been: print('These are the supplies in the list:\n', supplies), with single quotes (') instead of double quotes (") then then \n would have been printed but not interpreted as a special character.  At least in most computer language.  Since we don't know of which language the question refers to, we can't be sure at 100%.

7 0
3 years ago
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
Other questions:
  • Directions Use your imagination and a word processor to write a business letter with two to three paragraphs. Your business lett
    5·1 answer
  • given the numerical value 1010101.11, which of the following number systems is most likely represented.
    11·1 answer
  • Describe the Sign in process of an Email account.​
    6·1 answer
  • What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
    6·1 answer
  • Fix thos code:Error using spm_check_installation&gt;check_basic (line 93) You do not appear to have the function search path set
    6·1 answer
  • What are the three common forms for mining structured and unstructured data?
    14·1 answer
  • The Marketing Department for CSM Tech Publishing is busy producing videos and print materials (stored in PDF format) for distrib
    6·1 answer
  • What is the document that provides basic guidance and regulatory requirements for derivative classification
    9·1 answer
  • Subcribe to me for brainly my YT is KeepUsweatin
    9·1 answer
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!