1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
5

Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on pr

esentation technology because of its many benefits, which include _____.
Computers and Technology
2 answers:
Rom4ik [11]3 years ago
8 0

Answer:

visual appeal

ease of updating

ensured accuracy

fast creation

work that can't be lost

Explanation:

erica [24]3 years ago
4 0

Microsoft office? It includes slides,advanced timing during slides?

You might be interested in
Scenario2: Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in o
AleksandrR [38]

Answer:

The RTP (real time protocol) which uses the UDP ( user datagram protocol) and Real-time control protocol.

Explanation:

The RTP of a voice over IP protocol (VoIP) which is used to prioritise the transfer of video and audio data over text data. It is used for video conferencing and telephony services in an enterprise.

It uses the user-datagram protocol to transfer or access videos and audio data for its real time effect and the real-time control protocol for quality of service analysis and maintenance.

4 0
3 years ago
Use the Web to search for different ways to share an Access database, such as the one for Colonial Adventure Tours, with others
stellarik [79]

Answer:

Check the explanation

Explanation:

There are certainly many ways through which we can access and share database. The different ways to share an access database are as follows:  

1. By using Sharepoint site: To utilize the SharePoint you should have windows SharePoint services server enabled on your system. Sharepoint assists in making database accessing very convenient by using methods like linking to list and publishing a database.  

2. By using database server: This technique split a database that the tables are stored on the network in which each user has a copy of an access database file. The database file comprises of tables which contain queries, reports, forms, and other database objects.  

3. By using split database: This technique is utilized when a database server product or a SharePoint site is unavailable. The tables then gains access into one access file and everything goes to other access files.  

4. Network Folder: In this technique database file is stored on a shared network device and users can use the file simultaneously.  

Below is the table for necessary hardware and software:

                                                   Sharepoint  database     split       Network

                                                         site          server    database    Folder

Need for database server software?No             Yes       No        No

Need for windows server?                Yes              No        No        No

6 0
4 years ago
a.Write a Python function sum_1k(M) that returns the sum푠푠= ∑1푘푘푀푀푘푘=1b.Compute s for M = 3 by hand and write
stealth61 [152]

Answer:

def sum_1k(M):

   s = 0

   for k in range(1, M+1):

       s = s + 1.0/k

   return s

def test_sum_1k():

   expected_value = 1.0+1.0/2+1.0/3

   computed_value = sum_1k(3)

   if expected_value == computed_value:

       print("Test is successful")

   else:

       print("Test is NOT successful")

test_sum_1k()

Explanation:

It seems the hidden part is a summation (sigma) notation that goes from 1 to M with 1/k.

- Inside the <em>sum_1k(M)</em>, iterate from 1 to M and calculate-return the sum of the expression.

- Inside the <em>test_sum_1k(),</em> calculate the <em>expected_value,</em> refers to the value that is calculated by hand and <em>computed_value,</em> refers to the value that is the result of the <em>sum_1k(3). </em>Then, compare the values and print the appropriate message

- Call the <em>test_sum_1k()</em> to see the result

8 0
3 years ago
Write a program with a loop that asks the user to enter a series of positive numbers. the user should enter a negative number to
Dafna11 [192]
Int main(void){
int  n,s=0;
while(1){
scanf(" %d",&n);
if(n<0) break;
s+=n;
}
printf("sum=%d\n",s);
return 0;
}
5 0
3 years ago
Write a method equals that could be added to the IntTree class. (On your handout this method is called "equals", but Practice-It
masya89 [10]

Answer:

public boolean equals(Object other)

{

// check correct instance

if (other instanceof IntTree)

{

try

{

IntTree otherTree = (IntTree) other;

return equals(overallRoot, otherTree.overallRoot);

}

// caught exceptions

catch (Exception e)

{

return false;

}

}

return false;

}

public boolean equals(IntTreeNode tree1, IntTreeNode tree2)

{

// if reach ends

if (tree1 == null && tree2 == null)

{

// they are equal

return true;

}

else if (tree1 == null || tree2 == null)

{

// not equal

return false;

}

// check left part

boolean leftPart = equals(tree1.left, tree2.left);

// check current element is same

boolean currentPart = tree1.element.equals(tree2.element);

// check right part

boolean rightPart = equals(tree1.right, tree2.right);

// all are equal

return (leftPart && currentPart && rightPart);

}

Explanation:

6 0
3 years ago
Other questions:
  • Code Example 4-3 main program: import arithmetic as a def main(): num1 = 5 num2 = 6 result = a.add(num1, num2) print("The sum is
    15·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
    10·1 answer
  • If you want to adjust the width of a column manually, move your mouse over the _______ column boundary and click and drag until
    9·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    13·1 answer
  • C++ please
    8·1 answer
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
  • You want your computer to boot off of the network and have the ability to be brought out of sleep mode over the network. Which t
    5·1 answer
  • after adding a sound to a slide, the audio tools tab will allow you to apply artistic effects and quick styles to your sound ico
    7·1 answer
  • what is a simulation? a) simulation is the process of creating dashboards in excel. b) simulation is the process of complex form
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!