3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer 1

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:


Related Questions

What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.

Answers

Answer:

Buckling Spring

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

Answers

wmic diskdrive get size

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Answer : language

JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

What is voice recognition system ?​

Answers

Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

Explanation:

Answer:

Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.

To break a page click the _______ tab​

Answers

Answer: Page Break (or press ctrl + enter on keyboard)

Explanation:

Helpppp adapppppopppppp

Answers

Explanation:

(A) trust me I'm computer hecker experts

what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Answers

connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use

Answers

Answer:

EFS

Explanation:

A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?

Answers

Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.

Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data.

Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterprise

Hence, the first step is to develop an enterprise analytic strategy assessment.

Learn more : https://brainly.com/question/25602226

URGENT The HTML tag of a table cell content is

A. True
B. False

Answers

true ! its correct - have a great day

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems​

Answers

Answer: A) Primary Storage Media


Explanation:

A computer peripheral is any external device that provides input and output for the computer

The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.

What is a peripheral device?

A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.

Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.

The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.

A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that  option A is correct.

Learn more about peripheral device here:

https://brainly.com/question/21080721

#SPJ2

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this

Answers

Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.

Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.

Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.

Hence, the missing phrase is packet filtering firewall.

Learn more : https://brainly.com/question/25706522

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.

Please
I need help​

Answers

Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios

Give a brief explanation about the internet.plsssss

Answers

Answer:

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Explanation:

INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.

WILL MARK A BRAINLIEST!!! PLS HELP!!!





Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

man, just got rick rolled brb going to cry

Explanation:

Daijōbu desho. Datte Kimi yowai mon.

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.

Answers

Answer: B.) Design

Explanation: just took it

Answer:

b

Explanation:

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:

Answers

Answer:

logical

Explanation:

A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.

Answers

Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.

A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.

This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.

For example, a personal agent can be configured to remember key information when filling out Web forms.

Read more: https://brainly.com/question/21656851

Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.

Answers

Answer:

conduct an experiment in chemistry

Explanation:

A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.

Answer:

"conduct an experiment in chemistry"

Explanation:

A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Other Questions
Why do we have to have an English class if we speak English? AThe speaker portrays himself as the girls' enemy and victim in their pretend game of raiding the castle.BThe speaker expands this castle imagery to beyond his study, symbolic of the girls' invasion into all aspects of his home and life.CThe speaker expands this castle imagery until it includes himself, wherein his heart is a round-tower dungeon where he will always keep his love for his daughters.DThe speaker expands this castle imagery until it includes himself as parts of the castle, implying that he wants to remain guarded against his daughters' affection. PLEASE HELP WITH THIS ONE QUESTION Quiere reservar una mesa que est lejos de la puerta de entrada?La oracin contiene una clusula adjetiva con verbo en subjuntivo.Es cierta o falsa la oracin anterior?A) ciertaB) falsa 9. What was a purpose of the devshirme system? Which of the following often results from the use of drugs? A. Impaired brain function B. Unsafe driving C. Criminal behavior D. All of the above Please select the best answer from the choices provided. A B C D. What is the slope and y intercept form of -5x + 3y =-9.What is the slope and y intercept form of -x +2y =-20fast help. how is the first paragraph of ""thank you mam"" important to the plot? The outermost layer of rock on the earth is calledthe crust, which includes the continental crustand oceanic crust. Why is the oceanic crustmuch thinner than the continental crust,but much more dense?A it's composed of silica whichis high in oxygen and siliconB it's composed of basalt whichis high in iron and magnesiumC it's under the oceanD it's younger What did Russia, a largely Slavic nation, do after Austria-Hungary declared war on the Slavic nation of Serbia? Question 5 options: declare war on Germany pledge to remain neutral prepare to send troops to support Serbia try to negotiate a settlement. In which two places is aggregate generally found? floodplains and alluvial fans alluvial fans and mines mines and beneath the topsoil beneath the topsoil and above the topsoil. HELP ME OUT PLEASEUse the data to create a scatter plot. The DNA double helix is antiparallel. This means that the two strands Who was a US Senator in the 1950s thatbecame infamous for his unsubstantiatedaccusations against people of communismactivity?A. Dwight EisenhowerB. Joe McCarthyC. Douglas MacArthur 1Leo reads 11 pages in hour. What is the unit rate for pages per hour? For hours per page?4The unit rate is page(s) per hour. Find the gravitational potential energy of a body of mass 25kg,kept at a height of 4m If g=10m/s'. As organisms release energy during cellular respiration, carbon dioxide is produced from the carbon in energy storage molecules. This process moves carbon from biotic to ________________ a the producers b the decomposers c abiotic matter Graph the system of linear inequalities. Your graph should demonstrate that you're following the instructions below.Use x- and y- intercepts to graph inequality A.Use point-slope form to graph inequality B.A) 3x - 9y > 27B) (y-3) -4/3 (x+7)Show ALL work and EXPLAIN all your steps.Thank you for helping me understand this.PLEASE SHOW ME A PICTURE OF THE GRAPHED ANSWERS. In rhombus WXYZ, if WX=15, find YZ. AssignmentsIn a lottery, the top cash prize was $633 million, going to three lucky winners. Players pick four different numbers from 1 to 52 and one number from 1 to 41A player wins a minimum award of $400 by correctly matching two numbers drawn from the white balls (1 through 52) and matching the number on the gold ball (1through 41). What is the probability of winning the minimum award?Study PlanGradebookThe probability of winning the minimum award is(Type an integer or a simplified fraction what are the reasons to #3 and #5??options for both #3 and #5- CPCTC- Given- When two lines are parallel and cut by a transversal, the consecutive interior angles are supplementary - opposite sides of a parallelogram are parallel - reflexive property - angles that are supplementary to the same angle are congruent