should every presentation have a beggening middle and end​

Answers

Answer 1

Answer:

yes every presentation should have a beginning middle & end.

Explanation:

you should include these 5 parts

- introduction

- objective

- overview

- presentation

- summary/conclusion


Related Questions

Write A Code In Python

Code should be able to
- Save Usernames and Passwords that are entered
- Be able to login to an account when username or password is entered
- Allow Only 3 Log In Attempts

Answers

Answer:

Here is my code below: username = 'Polly1220' password = 'Bob' userInput = input("What is your username?\ n") if userInput == username: a=input("Password?\ n") if a == password: print("Welcome!") else: print("That is the wrong password.") else: print("That is the wrong username.")

Answer:

print('Enter correct username and password combo to continue')

count=0

while count < 3:

   username = input('Enter username: ')

   password = input('Enter password: ')

   if password=='Hytu76E' and username=='bank_admin':

       print('Access granted')

       break

   else:

       print('Access denied. Try again.')

       count += 1

A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power

Answers

Answer: Wi-Fi

Wi-Fi doesn’t use that much power and is very popular form of wireless communication. But this could also be Bluetooth because it is also a tarnsmission that occurs wirelessly.

The extends keyword applies to: [Choose all that apply - there may be more than one correct answer] Group of answer choices a member variable a method of the class an expression a class inheriting from another class the overridden toString method

Answers

The extends keyword extends a class (indicates that a class is inherited from another class). In Java, it is possible to inherit attributes and methods from one class to another.

Difference between misinformation and disinformation.

Answers

Both are false information but misinformation is without the intent to harm or deceive

A programmable machine can:

Answers

Answer:

Either be an embedded system, or a general purpose system.

Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m. Her server fails at 9:00 a.m. on Wednesday. How many backups does Susan need to restore

Answers

The number of files Susan needs to restore is three because she has full backup and the three files have crashed.

What is differential backup?

The most recent, previous complete data backup is used to create a differential backup. Only the data that has changed since the last full backup is captured in a differential backup. The basis of the differential is the full backup that a differential backup is based on.

Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m.

The server crashed on Wednesday at 9:00 am.

Since the Susan has full backup of her data which she did on Sunday at 1:00 am

Differential backups on Monday through Fridays at 1:00 a.m

So the number of files Susan needs to back up is three because the backup file which is taken on Wednesday at 1:00 am has also failed.

Thus, the number of files Susan needs to restore is three because she has full backup and the three files have crashed.

Learn more about the differential backup here:

https://brainly.com/question/14017082

#SPJ1

Next
Submit Test
Web Design and Development Tools: Mastery Test
Drag each tile to the correct box
Match the DHTML component to its description

scripting language
markup language
document object model
text stylesheet language

HTML
JavaScript
CSS
DOM

Answers

Answer:

script=java

makeup=Html

css=text

dom=document

Explanation:

Answer:  

greatness0003- is correct

I hope this helps

BTW Plato

(proof)

A command line above the worksheet where text, numbers, and formulas are entered into a worksheet. Question 18 options: Formula Formula Bar Worksheet Workbook

Answers

Formula bar is a command line above the worksheet where text, numbers, and formulas are entered into a worksheet.

What is the formula bar?

Formula bar is the white strip like space in above the worksheet, where what we write in the sheet, the text and formula are displayed. It is a place where you can edit the text and formula.

Thus, Formula bar is a command line above the worksheet where text, numbers, and formulas are entered into a worksheet.

Learn more about formula bar

https://brainly.com/question/14694227

#SPJ1

If an array is sorted from lowest to highest, then the smallest item will always display in the first element of the list / array and the largest item will display in the last element of the array.

A. True
B. False

Answers

It will be ascending, so it is true

When you are trying to anticipate user errors, which do you think is better to use—an if else statement or a try except statement? Why? Can you think of a rule that you could follow to determine which you should use?

Answers

Answer:

try except

Explanation:

You shouldn't use an if else statement for anticipating user errors since try-except was made for executing statements until encountering an error, while if-else is checking for a condition and if its not met, it will do an else.

A section with information that prints at the bottom of every page of a report is called a page [ ] section.

Answers

Answer:

Foot pager section

Explanation:

Please give brainliest please and good luck :)

a variable can be __ inside a program

Answers

Answer:

A function is a group of statements that exist within a program for the purpose of performing a specific task.

Explanation:

state how to transfee information from website to el processing document in computers and technology.​

Answers

Answer:

This is typically done either by downloading or by copying and pasting.

Explanation:

A site has been issued the IP address of 192. 168. 10. 0/24. The largest network contained 25 hosts and was given the lowest numbered network number possible. What network number and mask will be assigned

Answers

Answer:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

Explanation:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.

Your friend is writing a program that will allow the user to input a year and then print “LEAP!” if that year is a leap year or print “not a leap year” if it is not. However, the program isn’t working properly, and your friend asked you for help in debugging.

Before you take a look at the program, you should know these rules for leap years:

A year is a leap year if it can be divided by 400 without a remainder.
A year is a leap year if it can be divided by 4 without a remainder, unless it can also be divided by 100 without a remainder; if that is the case, it is not a leap year.
All other years are not leap years.
Here is your friend’s code:

year=int(input()
if year%400=0:
print("LEAP!")
else:
print(not a leap year")
elseif year%4==0 and year%100!=0
print(“not a leap year")
Note: You may not have seen the % symbol used this way before. It calculates the remainder of the number to the left of it when it is divided by the number to the right of it. So, 10%3 is 1, because when you divide 10 by 3, the remainder is 1.

Answers

The correct debugged code is attached below

What is a leap year

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : https://brainly.com/question/16397886

#SPJ1

What does a file extension tell your computer?.

Answers

Extensions tell your computer which application created or can open the file and which icon to use for the file. For example, the docx extension tells your computer that Microsoft Word can open the file and to display a Word icon when you view it in File Explorer.

Who is responsible for managing a website? Check all of the boxes that apply.
website supervisor
website host
web designer
webmaster

Answers

Answer:

website host web designer webmaster

Explanation:

Q:

Who is responsible for managing a website? Check all of the boxes that apply.

A:

website host web designer webmaster

The people who are responsible for managing a website may include the website host, web designer, and webmaster. Thus, the correct options for this question are B, C, and D.

What is a website?

A website may be defined as a collection of World Wide Web pages that usually contain links to each other and are made available online by an individual, company, or organization. It includes a collection of files and related resources accessible through the World Wide Web and organized under a particular domain name.

According to the context of this question, except for the website supervisor, all are responsible for managing a website. This is because it usually supervises and regulates websites that are managed by other people like website hosts, web designers, and webmasters.

Therefore, the people who are responsible for managing a website may include the website host, web designer, and webmaster. Thus, the correct options for this question are B, C, and D.

To learn more about Websites, refer to the link:

https://brainly.com/question/28431103

#SPJ2

A member has been asked to co-sign checks with a client employee while the company president is on vacation. Which statement about the application of the AICPA independence rules to this situation is correct

Answers

The statement about the application of the AICPA independence rules that is used in this situation is Because check-signing is a management function, independence is impaired.

What is AICPA independence rules?

The independence state that firm's partners and professional employees, have to be independent in line with the “Independence Rule” as well as others.

Note that the  statement about the application of the AICPA independence rules that is used in this situation is Because check-signing is a management function, independence is impaired.

Learn more about AICPA from

https://brainly.com/question/8026742

#SPJ1

This is an example of what type of formula?

=(D1-D17)

Question 3 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different types of formula functions in excel such as;

SUM

COUNT

COUNTA

IF

TRIM

MAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Design, implement and test a Java class that processes a series of triangles. The triangle specification will be identical to that in Programming Assignment #2 (part A). As in that assignment, you will read in the three sides of the triangle, check the input for errors (and handle them if found), classify the triangle and compute its area. For this assignment, triangle data will be read from an input file and the program’s output will be written to another file. The output file will also include a summary of the data processed. You must use at least one dialog box in this program.


The data for each triangle will be on a separate line of the input file, with the input data echoed and the results referred to by the line number (see example).

Some things to note:

• All input data lines must be processed.

• A new line with triangle data always starts with the ‘#’ marker.

• If an error is encountered on a given line, it must be handled. Afterwards, the program will continue on the next line without processing the triangle. An example of such an error is a non-integer appearing in the first three values of a given line.

• Extraneous data must be discarded. This is data that appears after the first three triangle sides are found, but before a new triangle marker is found.

• If the end of file (EOF) is found, a message should be printed out

• There shall be no unhandled file related exceptions and an end-of-file exception must be avoided.


On initialization, the program will prompt the user for both an input and an output file. If a non-existent input file is specified, the appropriate exception must be handled, resulting in an error message. For the exception case, re-prompt the user for the correct input file [Extra credit if you implement a JFileChooser type dialog box]. Once the I/O file is specified, the program will read in and process all the entries in the file. The output of the program will be written to the specified output file and echoed to the console.


The program will evaluate each line and determine the validity of the triangle. If valid, the program will output summary line for the triangle calculation (see Programming Assignment #2A). If invalid, the program will output a description of the error found in the entry. Your program must be robust and handle situations where all the triangle inputs are not proper and/or present.


Once all the entries are processed, a summary will be generated providing the following information:

• Pathname of the input file

• Number of lines processed

• Number of valid triangles

• Number of invalid triangles



You should be able to reuse much of your Programming Assignment #2A code for this project. However, strongly recommend that you rewrite your code and put this functionality in separate method(s). Likewise, any residual problems from #2A should be fixed in this version. The main features you will be adding are:


• Multiple methods

• Exception handing

• File I/O

• Dialog box

Answers

public class GeometricObject {

   private String color = " white ";

   private boolean filled;

   private java.util.Date dateCreated;

   public GeometricObject() {

       dateCreated = new java.util.Date();

   }

   public GeometricObject(String color, boolean filled) {

       dateCreated = new java.util.Date();

       this.color = color;

       this.filled = filled;  

   }

   public String getColor() {

       return color;

   }

   public void setColor(String color) {

       this.color = color;

   }

   public boolean isFilled() {

       return filled;

   }

   public void setFilled(boolean filled) {

       this.filled = filled;

   }

   public java.util.Date getDateCreated() {

       return dateCreated;

   }

   public String toString() {

       return "Created on " + dateCreated + "\n color: " + color + " and filled ";                

   }  

}

________ are not used for querying and analyzing data stored in data warehouses. Group of answer choices Word processing programs OLAP tools MOLAP tools Dashboard tools

Answers

Answer:

Word processing programs

Explanation:

Q:

________ are not used for querying and analyzing data stored in data warehouses.

A:

Word processing programs

(Python coding)4.3 Code Practice: Question 2
instructions:
Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate line.

Expected Output:
3
6
9
12
15
18
21

Answers

Answer:

i = 3

while i <= 21:

   print(i)

   i+=3

Explanation:

First, we will declare i as 3 because otherwise Python will yell at you and say there is no variable with i, we set it to 3 because we will print then increment in the while loop instead of increment then print

Next the while loop, it will go until i is less than or equal to 21 to print from 3 to 21

Then we will print i as an output. The print command will print each number on a separate line

After that we will increment i by 3 to find the next multiple of 3

This solution will print the following:

3

6

9

12

15

18

21

Question 1 of 1
What are some of the things your employer should do to prevent worker falls and
accidents using portable ladders at the workplace?

Answers

Answer:

Ladders are not moved, shifted, or extended while a worker is on them.

Explanation:

It's the most logical answer out of the others.

Which programming paradigm focuses on abstraction to the level of math and the elimination of side-effects and state based programming

Answers

Answer:

The functional programming paradigms has its roots in mathematics and it is language independent.

Explanation:

The key principle of this paradigms is the execution of series of mathematical functions. The central model for the abstraction is the function which are meant for some specific computation and not the data structure.

From the ITAdmin workstation, use the tracert command to identify the devices in the path between ITAdmin and a remote computer on the internet that has an IP address of 206.8.28.127. How many routers are in the path between ITAdmin and the remote computer

Answers

Answer:

This problem has been solved! From the IT Administrator workstation (named ITAdmin), use the tracert command to identify the devices in the path between itself and a remote computer

Explanation:

This problem has been solved! From the IT Administrator workstation (named ITAdmin), use the tracert command to identify the devices in the path between itself and a remote computer

An IP address is an application programming interface connected to a computer network. There are six routers in the path between IT admin and remote computer.

What is a router?

A router is a device that brings the internet service to your linked devices. It is used to forward the data packets on the network channel and also, maintain the traffic of the data on the server.

The default gateway is the IP of the local router that is not routed somewhere else but can be used to manage the router. The default gateway serves as the forwarding host.

Therefore, six routers are placed between the IT admin and the remote computer.

Learn more about IP address here:

https://brainly.com/question/20372171

#SPJ1

The ownership of digtal assets in the emerging metaverse is being driven by what technology that enable the ownership of digital assets, such as gucci digital sneaker?.

Answers

The ownership of digital assets in the emerging metaverse is being driven by Blockchain.

What are digital assets?

Digital asset is known to be any item that can be saved digitally and its  specifically recognized  that firm that can use or realize its value. Examples are documents, audio, etc.

Conclusively, The ownership of digital assets in the emerging metaverse is being driven by Blockchain as it helps to save plenty of its data.

Learn more about digital assets from

https://brainly.com/question/5679893

#SPJ1

D). Name the piece of hardware found in a tablet computer that is both an Input and output device?​

Answers

It’s an SD card that can be found in both

What threat do insiders with authorized access to information?

Answers

Answer:

An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage

Explanation:

Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.

Answers

Answer:

random access files

Explanation:

Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.

✓ RANDOM ACCESS FILES

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems

Answers

Answer:

packet sniffer

Explanation:

Q:

What tool would you use if you want to collect information as it is being transmitted on the n…

a. content filter

b. vulnerability scanner...

A:

packet sniffer

Other Questions
Blood Blood has four main components:Plasma is a straw-colored fluid. It is about 90 percent water and 10 percent dissolved gases, salts, nutrients, enzymes, hormones, waste products, plasma proteins, cholesterol, and other important compounds. Parts of plasma help control body temperature, transport substances, and fight infection. Plasma proteins are involved in blood clotting.Red blood cells transport oxygen. Blood gets its red color from the iron in hemoglobin, a protein that binds oxygen in the lungs and releases it in the capillaries.White blood cells guard against infection, fight parasites, and attack bacteria.Platelets are cell fragments involved in blood clotting.For Questions 1-5, write True if the statement is true. If the statement is false, change the underlined word or words to make the statement true.___________2. The human body contains 8-10 liters of blood. What effect does migration have on human populations? 72.How many atoms are present in one mole ofwater?A)54B)3C)3(6.02 1023)D)6.02 x 1023 If there are 5,280 feet in d mile, how many feet was the Titanic from land? what is fair use? - the use of copyrighted work without giving appropriate attribution- exceptions to the exclusive rights of copyright protection- an encroachment or violation of copyright law the use of patented work Jeremiah just got hired for a new job and will make $35,000 in his first year. Jeremiah was told that he can expect to get raises of $3,500 every year going forward. How much money in salary would Jeremiah make in his 9th year working at this job? you are working as an analytical ghemist at a university. an archeologist is studying a village dating to 800 to 1000 years ago brings you a sample of charcoal from a dig site 300 meters from the main village site. the archeologist asks you to analyze the sample to see if it could be from a new part of the village or was it naturally occurring. what is the scientific question the archeologist is asking of you? Mai needs 3 pounds of birdseed to fill all birdeeders in her yard. the store sells birdseed by the ounce 1 pound= 16 ounce how many birdseed does mai need to fill the birdseed if the radius is 17inches what is the diameter l Which of the following is a synonym for the word "compulsory?"expectedO recommendedrequiredO optional Polly has 7 cucumbers to sell at the market. She has 3 times more carrots than cucumbers. She sells 6 carrots at the market. How many carrots does Polly have left A direct variation includes the points (3,72) and ( 2,n). Find n. Whose historical work became the foremost source for byzantine political history during the first crusade?. please solve for me please be correct alex has 5 t-shirts in the drawer. 2 are white, and the rest are black. He will pick a t-shirt from the drawer without looking, and then without replacing it, will pick a second t-shirt without looking. What is the probability that he will pick a white t-shirt on his first pick and a black t-shirt on his second pick? 2 Find the mode and median from the following numbers 5,8, 6, 9, 7, 4, 10, 2, 5, 9, 0, 1, 6,9 What role does immunity play when caring for a patient that is experiencing a high amount of stress due to a loss?. Which statements about the value of the digits in the number 6,666,666 are true?Select each correct answer.The digit in the thousands place is 16 the value of the digit in the ten thousands place.The digit in the hundred thousands place is 110 the value of the digit in the millions place.The digit in the ten thousands place is 10 times the value of the digit in the thousands place.The digit in the hundreds place is 60 times the value of the digit in the tens place. The volume of a right cone is 3525\pi units^3 3 . If its diameter measures 30 units, find its height. List a specific example with a set and a subset.Your example needs to be unique and in your own words.