Select the correct answer. Why is it important to identify your audience while making a presentation? A. It helps you define the time limit and number of slides required in the presentation. B. It helps you adapt the presentation to the appropriate level and complexity. C. It helps you establish whether you require a conclusion in your presentation. D. It helps you decide how much practice you need for the presentation.

Answers

Answer 1

Answer:B

Explanation:

Answer 2
Just saw brown vent open on the front door in the right direction lol I have o clue where

Related Questions

what is the significance of the following terms A A L U control unit in the CPU​

Answers

Answer:

Explanation:

The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).

The function of CU is to control and coordinate the activities of the computer.

Exercise 1.3.5: Expressing conditional statements in English using logic. info About Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job. (c) I am not getting a job, but I am still not returning to college. (d) I will return to college only if I won't get a job. (e) There's no way I am returning to college. (f) I will get a job and return to college..

Answers

hope this helps!!!. i worked hat

At Moore High, 456 students attended the prom. This is 65 more students than
the previous year.
To the nearest percent, what is the percent of increase from last year to this
year?
12%
15%
17%
19%

Answers

Answer:

B-15%

Explanation:

Yes I agree the answer is B 15%

What is the climax of Ralph breaks the internet?

Answers

Answer:

As with the real internet, side quests often end up becoming main quests, and Vanellope falls in love with the gritty nature of internet gaming (through Gal Gadot's speed-racer Shank). Ralph Breaks The Internet also ends up going into the dark web and uses that to form the base of the climax of the film.

Explanation:

hope that help thanx

Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.

a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal

Answers

Answer:

2345

Explanation:

Answer:

✔ a nonprofit website that provides information on how to clean up the environment

✔ a recent newspaper article on global warming from a reputable news organization

✔ a government website providing information on national efforts to investigate global warming

✔ a magazine article about climate change in a respected scientific journal

Explanation:

simplified version: 2345

Any1??
Write the names of atleast 22 high-level programming languages

Answers

Answer:

1 Array languages

2 Assembly languages

3 Authoring languages

4 Constraint programming languages

5 Command line interface languages

6 Compiled languages

7 Concurrent languages

8 Curly-bracket languages

9 Dataflow languages

10 Data-oriented languages

11 Decision table languages

12 Declarative languages

13 Embeddable languages

13.1 In source code

13.1.1 Server side

13.1.2 Client side

13.2 In object code

14 Educational languages

15 Esoteric languages

16 Extension languages

17 Fourth-generation languages

18 Functional languages

18.1 Pure

18.2 Impure

19 Hardware description languages

19.1 HDLs for analog circuit design

19.2 HDLs for digital circuit design

20 Imperative languages

21 Interactive mode languages

22 Interpreted languages

23 Iterative languages

Explanation:

Why are object-oriented languages very popular?
They can use flowcharts.
They can use pseudocode.
They are powerful, clear, and efficient.
They don't use binary.

Answers

Answer:

Explanation:

Other advantages of object-oriented programming languages are you can use it to kinds of web applications for thorough data analysis, less development time, accurate coding, easy testing, reusability, debugging, less data corruption, and maintenance.

Write a constructor for BaseballPlayer. The constructor takes three int parameters: numHits, numRuns, and numRBIs storing the values within the class' ArrayList field named playerStats.

Answers

Answer:

Following are the code to the given question:

public class BaseballPlayer//defining a class BaseballPlayer

{

BaseballPlayer(int numHits, int numRuns, int numRBIs)//defining a parameterized cons

{

}

}

Explanation:

Some of the data is missing, which is why the solution can be represented as follows:

In this code, a class BaseballPlayer is defined, and inside the class a parameterized constructor is defined that holds three integer variable "numHits, numRuns, and numRBIs".

Write a class called Person that has two data members - the person's name and age. It should have an init method that takes two values and uses them to initialize the data members.Write a separate function (not part of the Person class) called std_dev that takes as a parameter a list of Person objects (only one parameter: person_list) and returns the standard deviation of all their ages (the population standard deviation that uses a denominator of N, not the sample standard deviation, which uses a different denominator).

Answers

Answer:

class Person(object):

   def __init__(self, name, age):

       self.name = name

       self.age = age

 

def std_dev(person_list):

   average = 0

   for person in person_list:

       average += person.age

   average /= len(person_list)

   total = 0

   for person in person_list:

       total += (person.age - average) ** 2

   return (total / (len(person_list) )) ** 0.5

Explanation:

The class "Person" is a python program class defined to hold data of a person (name and age). The std_dev function accepts a list of Person class instances as an argument and returns the calculated standard deviation of the population.

Difference between analog and digital computer ??

Answers

Answer:

The analogue computer works on a continuous signal. The digital computer works on a discrete signal. The output is a voltage signal, they are not exact values and are in graphical form.

How do we use game maker?

Answers

Answer:

The easy to use powerful game engine that is the best for 2D games

Are chairs and tables considered technology?
A) true
B) false

Answers

Answer:true

Explanation:

By definition technology is the skills methods and processes used to achieve goals

Chairs and tables are considered technology. The given statement is True.

A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.

How does technology make your life comfortable?

They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.

Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.

Thus, Technology includes things like chairs and tables. The assertion is accurate.

Learn more about technology here:

https://brainly.com/question/9171028

#SPJ2

Choose the type of collection created with each assignment statement. collectionA = {5:2} collectionB = (5,2) collectionC = [5, 2]

Answers

Answer:

CollectionA is Dictionary

CollectionB is List

CollectionC is Tuple

Explanation:

List is recognized by the square brackets

Tuple by the parentheses

Dictionary by the curly brackets

Answer:

Dictionary collectionA

Tuple collectionB

List collectionC

Explanation:

A dictionary uses curly brackets. A tuple uses parentheses. A list uses square brackets.

Conside following prototype of a function
int minArray(int [], int );
Which of the option is correct way of function CALL assuming following arraydeclaration
int x[5] = {7,4,6,2,3};*
a) minArray(x,5);
b) minArray(x[],10);
c) minArray(x[5],5);
d) minArray(5,x);

Answers

Answer:

The answer is "Option a"

Explanation:

Following are the code to this question:

#include <stdio.h>//header file

int minArray(int x[], int n)//defining method minArray that accepts two parameters

{

   for(int i=0;i<n;i++)//defining loop for print value

   {

    printf("%d\n",x[i]);//printf array value

   }

}

int main()//defining main method

{

int x[] ={7,4,6,2,3};//defining array that hold values

int n=5;//defining integer variable

minArray(x,5);//calling method minArray

return 0;

}

In this code, a method "minArray" is defined, that accepts two parameters array and an integer variable in its parameter, and in the next step, the for loop is declared, that uses the print method to prints its value.

In the next step, the main method is declared, which declared an array and holds its values and defines an integer variables, and calls the method "minArray".

Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would write the value of the salary variable to the file
A) cout < B) ofstream C) dataFile << salary;
D) payroll.dat <

Answers

Answer:

dataFile << salary;

Explanation:

To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:

ofstream dataFile;

myfile.open ("payroll.dat");

myfile <<salary;

myfile.close();

This line creates an instance of ofstream

ofstream dataFile;

This line opens the file payroll.dat

myfile.open ("payroll.dat");

This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat

myfile <<salary;

This closes the opened file

myfile.close();

Write a method named numUnique that accepts a sorted array of integers as a parameter and that returns the number of unique values in the array. The array is guaranteed to be in sorted order, which means that duplicates will be grouped together. For example, if a variable called list stores the following values: int[] list

Answers

Answer:

The method in Java is as follows:

public static int numUnique(int list[]) {  

int unique = 1;  

for (int i = 1; i < list.length; i++) {  

 int j = 0;  

 for (j = 0; j < i; j++) {

  if (list[i] == list[j])  

   break;  

 }

 if (i == j)  

  unique++;  

}  

return unique;  

}  

Explanation:

This line defines the numUnique method

public static int numUnique(int list[]) {

This initializes the number of unique elements to 1

int unique = 1;  

This iterates through the list

for (int i = 1; i < list.length; i++) {

The following iteration checks for unique items

 int j = 0;  

 for (j = 0; j < i; j++) {

  if (list[i] == list[j]) If current element is unique, break the iteration

   break;  

 }

 if (i == j)  

  unique++;  

}

This returns the number of unique items in the list

return unique;  

}  

Which of the following is NOT one of the Internet sources that hackers use to gather information about a company's employees?

1. Blogs
2. Company website
3. Social networking sites
4. Regional Internet registries

Answers

Answer:

4. Regional Internet registries

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords such as using alphanumeric password with certain composition and strength.

Some examples of the Internet sources that hackers use to gather information about a company's employees includes;

I. Blogs.

II. Company website.

III. Social networking sites.

However, Regional Internet registries cannot be used by hackers to gather information about a company's employees because it is an internet protocol resource organization saddled with the responsibility of allocating and registering internet protocol (IP) addresses.

A drink costs 2 dollars. A taco costs 3 dollars. Given the number of each, compute total cost and assign totalCost with the result. Ex: 4 drinks and 6 tacos yields totalCost of 26.
*/
int main() {
int numDrinks = 0;
int numTacos = 0;
int totalCost = 0;
numDrinks = 4;
numTacos = 6;
/* Your solution goes here */
totalCost = (2 * numDrinks) + (3 * numTacos);
cout << "Total cost: " << totalCost << endl;
return 0;
}

Answers

Answer:

See Explanation

Explanation:

The question has been answered; however, the program is not dynamic enough because the output will always be 26.

To make it dynamic, replace the following lines of code:

numDrinks = 4;

numTacos = 6;

with:

cout<<"Number of drinks: ";

cin>>numDrinks;

cout<<"Number of Tacos: ";

cin>>numTacos;

The above lines of code will let the user input different values for numDrinks and numTacos each time the program is executed.

Computing the total cost using code can be represented as follows:

def total_cost(no_of_drinks, no_of_talcos):

  totalCost = 2*no_of_drinks + 3*no_of_talcos

  return totalCost

print(total_cost(4, 6))

Python code explanation:

A function named total_cost is declared and it accept the parameters no_of_drinks and no_of_talcos.

The totalCost is used to store the result of the cost of the total drinks and tacos bought in dollars.

Then, we return the totalCost.

Finally, we use the print statement to call the function with its required parameters.

learn more on python code:https://brainly.com/question/14479908?referrer=searchResults

An algorithm requires numbers.
O True
O
False

Answers

True hope this helps

Answer:

It is true

Explanation:

If an ISP assigned you a /28 IPv6 address block, how many computers could be as- signed an address from the block?

Answers

Answer:

I think 14 hosts (computer)

Write a program that takes a first name as the input, and outputs a welcome message to that name.
Ex: If the input is Pat the output is:
Hello Pat and welcome to cs Online
Input Welcome message
1 user_name = input 2 3
Type your code here

Answers

Answer:

The program in Python is as follows:

user_name = input("Name: ")

print("Hello "+user_name+" and welcome to cs Online")

Explanation:

The program is written in Python, and it uses basic input and output function to execute the instruction in the question.

First: Prompt the user for username

This is done in the following line

user_name = input("Input your name: ")

Next, the print function is used to output the welcome message

print("Hello "+user_name+" and welcome to cs Online")

The program that takes first name as the input, and outputs a welcome message to that name is represented below:

user_input = str(input("please type your first name: "))

print(f" Hello {user_input} !! Welcome to CS online ")

The code is written in python.

The variable user_input is used to store the user's input. It ask the user for his/her first name and store it.

Then we print the welcome statement using the f string.

F-string are use to combine strings and variables.

learn more on python program; https://brainly.com/question/14644566?referrer=searchResults

Adding a paper clip to the vertical stabilizer of your glider will have what effect on its Center of Gravity (CG)?
The CG would move toward the rear.
The CG would stay the same.
The CG would move toward the nose.
O The CG would move lower

Answers

Answer:

the CG would move toward the rear.

Explanation:

Adding a paper clip to the vertical stabilizer of your glider will, the CG would move toward the rear. The correct option is A.

What is center of gravity?

The place on an item where the force of gravity is thought to act is known as the center of gravity (CG).

The gravitational pull is thought to be focused at the point where an object weighs on average. Depending on the object's size, shape, and mass distribution, the center of gravity will be in one place or another.

The impact of adding a paper clip to your glider's vertical stabilizer is to shift the center of gravity (CG) to the back of the glider.

This is due to the fact that the paper clip adds weight to the glider's rear, moving the center of mass there and, as a result, the center of gravity.

Thus, the correct option is A.

For more details regarding center of gravity, visit:

https://brainly.com/question/20662119

#SPJ6

Cathy connected a keyboard, mouse, and printer to her Computer through a Bluetooth connection. What type of network has she created?

Answers

Answer:

Cathy has created a Personal Area Network

Explanation:

Let us define a personal area network.

A personal area network is created by connecting multiple devices of a user and it is panned over a very short distance. Mainly used technology is Bluetooth.

Cathy has used Bluetooth to connect keyboard, mouse and printer to her computer, she has formed a Personal Area Network.

Answer: pan

Explanation: got it right edmentum

var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}
This code will create an infinite loop. Why does it create an infinite loop?

Answers

Answer:

Explanation:

This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.

Answer:

[tex]var nums = [1,1, 2, 3, 5, 8, 13, 21];

var copyNums = [1,1, 2, 3, 5, 8, 13, 21];

for(var i=0; i < copyNums.length; i++){

if(copyNums[i] == 1){

insertItem(copyNums,i,"hello");

}

}[/tex]

Which function in spreadsheet software can be used to predict future sales or inventory needs?

Answers

create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.

Answer:forecast

Explanation:

DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:

Answers

Answer:

The output is to the given question is:

nist

nsrt

imdA

strat

Explanation:

The missing code can be defined as follows:

code:

s = "Administrator" #defining a variable that hold string value

print(s[4:8])#using slicing with the print method  

print(s[4: 12:2])#using slicing with the print method  

print(s[3::-1])#using slicing with the print method  

print(s[-7:-2])#using slicing with the print method    

In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.

A technician who is managing a secure B2B connection noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to question certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two)
a. PEM
b. CER
c. SCEP
d. CRL
e. OCSP
f. PFX

Answers

Answer:

d. CRL

e. OCSP

Explanation:

Note, the term PKI stands for Public Key Infrastructure.

Among all the PKI components, the CRL (CERTIFICATE REVOCATION LISTS), which contains a list of issued certificates that were later revoked by a given Certification Authority, and the PFX format used for storing server certificates should be examined by the technician use to validate his assumption.

can you answer this question?

Answers

Answer:

The SIZE constant is not definedThe variable i should be defined at the start of the function, not within the condition of the while loopThe main function returns no value.  Generally they should return a zero on success.The printf text "%d" should actually be "%f".  %d treats the variable as though it's an integer.

can you answer this question?

Answers

Answer:

To do this you'll need to use malloc to assign memory to the pointers used.  You'll also need to use free to unassign that memory at the end of the program using the free.  Both of these are in stdlib.h.

#include <stdlib.h>

#include <stdio.h>

#define SIZE_X 3

#define SIZE_Y 4

int main(void){

       int **matrix, i, j;

       // allocate the memory

       matrix = (int**)malloc(SIZE_X * sizeof(int*));

       for(i = 0; i < SIZE_X; i++){

               matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));

       }

       // assign the values

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_Y; j++){

                       matrix[i][j] = SIZE_Y * i + j + 1;

               }

       }

       // print it out

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_X; j++){

                       printf("%d, %d:  %d\n", i, j, matrix[i][j]);

               }

       }

       // free the memory

       for(i = 0; i < SIZE_X; i++){

               free(matrix[i]);

       }

       free(matrix);

       return 0;

}

Consider the following class designed to store weather statistics at a particular date and time:
public class WeatherSnapshot
{
private int tempInFahrenheit;
private int humidity; // value of 56 means 56% humidity
private int dewPoint; // in degrees Fahrenheit
private String date; // stores the date as a String
private int time; // in military time, such as 1430 = 2:30 pm
private boolean cloudy; // true if 25% or more of the sky is covered
// constructor not shown, but it initializes all instance variables
// postcondition: returns temperature
public int getTemp()
{
return tempInFahrenheit;
}
// postcondition: returns date
public String getDate()
{
return date;
}
// postcondition: returns true if precipitation is likely; false otherwise
public boolean precipitationLikely()
{
// implementation not shown
}
// other methods not shown
}
Suppose a WeatherSnapshot object named currentWeather has been correctly instantiated in a client class. Which of the following will correctly call the precipitationLikely method?
A. boolean couldRain = precipitationLikely();
B. boolean couldRain = currentWeather.precipitationLikely();
C. boolean couldRain = currentWeather.precipitationLikely(true);
D. double percentChanceOfRain = precipitationLikely();
E. double percentChanceOfRain = currentWeather.precipitationLikely();

Answers

Answer:

The answer is "Option b".

Explanation:

In this question, It took the boolean parameter, which may use the couldRain as the precipitationLikely precipitation method as the boolean variable because the precipitationLikely is not a static type, and it can name this method utilizing object is called currentWeather, that's why the choice b is correct.

Other Questions
Sasha walks at a constant rate. She meets her friend Hannah 0.6 kilometer along the way, and thet continue walking at the same constant rate. When thay get to school, Sasha has walked for 0.6 hour and Hannah has walked 0.45 hour. What is the rate in kilograms per hour at which they walked to school What are some similarities between texting and writing letters. pls I need it fast. I will mark brainleast!! At what temperature a gas with volume 175 L at 15 oC and 760mmHg will occupy a volume of 198 L at a pressure 640mmHg? Please please help! Find sin(90).45A.0.1C. square 2 D. square 2 / 2 please please please help quick Somebody is following us (passive FIRST CORRECT ANSWER GETS BRAINLIEST!A siren and a newt are classified in the salamander family. What characteristics may have been used to group them? Which of the following numbers might this code generate: random.randint(1,9)?010111 Federal, Social Security, and Medicare are all types of taxes, true or false? Help me please I need it really bad. Why were Chinese scholar officals reluctant to adopt western ideas? Lean ground beef costs $7.25 per pound. Which equation best represents y, the total cost of x pounds of lean ground beef?ax = 7.25 + y by = 7.25 + x cx = 7.25y dy = 7.25x Jessica deposited $5000 in a simple interest account 4 years ago. She has earned $680 in interest so far. What is the interest rate for this account? Listed the works which were banned by the church (30PTS) What are the slopes of the asymptotes of a hyperbola with equation x^2/2^2-y^2/6^2=1 For example, you could tell me about the Chimp (Amygdala) and the Professor (Prefrontal Cortex) as they attend college at the Hippocampus. You can use these characters or make up your own. This exercise is to help you remember some of the brain structures and what they do. What is the inverse function of f(x) = -2? help i guess? Ik its easy i just got lazy All energy comes from the: water air sun environment