Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Responses For extending the learning experience for students. To make sure the presentation is linear So students can use the Slides for review and can go to additional resources outside of the presentation. To make the presentation more graphically appealing

Answers

Answer 1

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.


Related Questions

when did brainly open?

Answers

Answer:

September 2009, Kraków, Poland

Explanation:

serch it up

can i get brainliest

thank you and have a great dayyyyy:)

What does “int” means in php code

Answers

Answer:

integer

Explanation:

Why are the social and ethical consequences of emerging technology hard to
predict?

Answers

Answer:

Technology is rapidly evolving over a short period of time. Which leads to a change in how people perceive and subsequently react to these fast paced advances.

Answer: try this one: It is impossible to see how technology will be applied to situations that have not yet occured.

Explanation: if it’s wrong please tell me

What are limitations of AI

Answers

Explanation:

Limitations of artificial intelligence. One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale.

Answer:

Risks and limitations of artificial intelligence in business

Businesses are increasingly looking for ways to put artificial intelligence (AI) technologies to work to improve their productivity, profitability and business results.

However, while there are many business benefits of artificial intelligence, there are also certain barriers and disadvantages to keep in mind.

Limitations of artificial intelligence

One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale. To overcome this, you should have a clear strategy from the outset for sourcing the data that your AI will require.

Another key roadblock to AI adoption is the skills shortage and the availability of technical staff with the experience and training necessary to effectively deploy and operate AI solutions. Research suggests experienced data scientists are in short supply as are other specialised data professionals skilled in machine learning, training good models, etc.

Cost is another key consideration with procuring AI technologies. Businesses that lack in-house skills or are unfamiliar with AI often have to outsource, which is where challenges of cost and maintenance come in. Due to their complex nature, smart technologies can be expensive and you can incur further costs for repair and ongoing maintenance. The computational cost for training data models etc can also be an additional expense.

Software programs need regular upgrading to adapt to the changing business environment and, in case of breakdown, present a risk of losing code or important data. Restoring this is often time-consuming and costly. However, this risk is no greater with AI than with other software development. Provided that the system is designed well and that those procuring AI understand their requirements and options, these risks can be mitigated.

See also Industry 4.0 challenges and risks.

Other AI limitations relate to:

implementation times, which may be lengthy depending on what you are trying to implement

integration challenges and lack of understanding of the state-of-the-art systems

usability and interoperability with other systems and platforms

If you're deciding whether to take on AI-driven technology, you should also consider:

customer privacy

potential lack of transparency

technological complexity

If you're considering writing a tender document to procure AI, you can seek help from the Northern Ireland Artificial Intelligence Collaborative Network(link is external).

AI and ethical concerns

With the rapid development of AI, a number of ethical issues have cropped up. These include:

the potential of automation technology to give rise to job losses

the need to redeploy or retrain employees to keep them in jobs

fair distribution of wealth created by machines

the effect of machine interaction on human behaviour and attention

the need to address algorithmic bias originating from human bias in the data

the security of AI systems (eg autonomous weapons) that can potentially cause damage

the need to mitigate against unintended consequences, as smart machines are thought to learn and develop independently

While you can't ignore these risks, it is worth keeping in mind that advances in AI can - for the most part - create better business and better lives for everyone. If implemented responsibly, artificial intelligence has immense and beneficial potential.

What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD

Answers

Answer:

D) MXN, ZAR, HKD

Explanation:

Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.

What are the useful techniques in program design?

Answers

A broad question, with many answers.

When designing a program you can use:

Setting up requirements, possibly in a use-case form ("as a ... I want to ... so that ...")Mapping the verbs and nouns in your requirements to classes and operations Drawing UML diagrams of the subject matterCreating flow charts and sequence diagrams Identify component boundaries with thin interfaces to keep complexity organized and local

What visual practice provides more information about logical relations when creating an ERD

Answers

Answer:

Logical Data Model

Explanation:

An Entity Relationship Diagram (ERD) is a model or a diagram designed to reveal the relationship between various entities such as people, places, objects, and so on within an institution. Entity relationship diagram is also known as Entity relationship model. This model is used to design relational database by various sectors such as education, engineering, business, etc.

ERD is designed using conceptual data model, logical data model, and physical data model.

The visual practice or model that gives more insight into the logical relations among the entity is the logical data model.

The logical data model is used to illustrate more detailed operational and relational data among the entities. It is more detailed than the conceptual data.

So, the correct answer is logical data model.

Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this thread1) cannot proceed because itâ s waiting (either directly or indirectly) for another thread (letâ s call this thread2) to proceed, while simultaneously thread2 cannot proceed because itâ s waiting (either directly or indirectly) for thread1 to proceed. The two threads are waiting for each other, so the actions that would enable each thread to continue execution can never occur.

Answers

Answer:

"Deadlock" is the right solution.

Explanation:

A deadlock seems to be a circumstance where certain (two) computer algorithms that share a similar resource essentially prohibit each other during manipulating the asset, leading to both programs withdrawing to operate.This occurs when multiple transfers or transactions block everyone by maintaining locks onto assets that every other activity also needs.

So that the above is the correct answer.

For safety, the lights on your vehicle must be in good working condition. Which statement about
checking your lights is true?
A: You must check all your lights often, and promptly replace any burned out boys
B: You should check your lights every six months and replace any burned out bulbs.
C: On modern cars, the lights are so reliable that you almost never have to check them,

Answers

Answer:

The answer is B

Explanation:

The database model that uses a series of two-dimensional tables or files to store information is the ________________ model. This database model has become the most popular database structure, as it is used by most microcomputer DBMS packages:

Answers

Answer:

The relational database model

Explanation:

The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

What is the relational structure model?

The relational model (RM) is known to be set up for database management as it is a method used in managing data via the use of a structure and language that are in line with first-order predicate logic.

Note that The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

Learn more about database from

https://brainly.com/question/26096799

#SPJ9

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

3. What does a production sound mixer do? Which responsibility of a production sound mixer do you think sounds most difficult and why? A production sound mixer has many duties, he has to announce each take that is being films, he also is responsible for recording voice-overs/wild lines. In my opinion the most difficult is recording the wild lines because the dialogues and all the film lines are in your hands, it's a lot of responsibility and you need to be very organized to keep track of all the lines you need to record and make sure that everything sounds right.

Answers

Answer:

The production sound mixer has various jobs around the studio, such as slating, wild lines, voice-overs, and background sound effects. Their hardest is likely slating, which requires a bit more precision than their other jobs.

Explanation:

"What does a production sound mixer do? Which responsibility of a production sound mixer do you think sounds most difficult and why?"

Straight from the lesson related to this question:

In getting sound right for a film, equipment is only part of the story. People are also needed to best use that equipment... On smaller-budget films, the filmmaker may select a production sound mixer who has his or her own equipment as this choice can save the filmmaker a considerable amount of money in sound equipment rental, and the mixer is likely to be skilled in using his or her own equipment.

In short, the production sound mixer is a person hired to mix sounds together in a film production. They have several responsibilities, such as those included in the passage below:

The responsibilities of the production sound mixer position can vary, again depending on the film's budget, needs, and size of crew. However, the production sound mixer does perform certain functions for almost every film. For example, s/he announces each take that is filmed and is responsible for slating. Slating is the use of the film slate, also called a clapboard, which shows specific information about each take, such as the date, director, production, scene number, and take number.

The production sound mixer can also be responsible for recording voice-overs, which are actors' lines that are not spoken by the actors within the scene... The sound mixer also records what are called "wild lines," which are lines that the actors repeat because the originals were not spoken or recorded clearly enough for the film's needs. He or she may not necessarily be responsible for creating the sound effects, but he or she may be responsible for recording the sound effects that someone else creates.

The production sound mixer has various jobs around the studio, such as slating, wild lines, voice-overs, and background sound effects. Their hardest is likely slating, which requires a bit more precision than their other jobs.

Quotes from FLVS.

Draw a truth table & logic circuit corresponding to the following logic statement
X = 1 if ( ( M is 1 OR N is 1 ) AND ( M is 1 AND N is 1 ) ) OR ( O is NOT 1 )

Answers

Answer:

The truth table, as well as the logic circuit of the given statement, is attached below.

Explanation:

Logical gates seem to be the essential building blocks of just about any computerized signal. It becomes a digital device with one or even more inputs and therefore only single output. The arrangement among outputs and inputs would be focused on this kind of logic. Upon that basis, logic gates were already called as AND, NOT, OR gate, etc.

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

How to Fix 0xc000007b

Answers

Answer:

Method 1. Restart your computer

The first thing to try is restarting Windows. It sounds too simple, but it sometimes yields results.

Method 2. Update .NET framework

In most cases it's Microsoft .NET framework causing the issues. You can download the latest version of .NET Framework from Microsoft.

When it's installed (or re-installed) reboot and try your app or game again

Method 3. Enable Administrator rights

Try running the game or app with admin rights. To do that, right-click on the shortcut or the actual executable for the game, select Properties and open the Compatibility tab. Tick the 'Run this program as an administrator' box, and click on OK.

Method 4. Reinstall the app or game

You can uninstall and re-installing the game or program you're trying to run - simple but sometimes the quickest and most effective way to get rid of the error.

Method 5. Update Windows

Update Windows. In many cases Windows will automatically update, but to check, head to Control Panel and search for 'Windows Update'.

In later versions, including Windows 10, you can open the new Settings app (just search the Start menu or click the cog icon which appears just above the Windows logo when you click it in the bottom-left of the screen.

In the Settings app, click on Update & Security then you should see a button to check for updates:

Explanation:

Method 6. Run ChkDsk

Run chkdsk by opening cmd (search for it or press Win+R).

In the window type "chkdsk c: /f /r". If it is the primary windows disk, it will ask you to schedule it for next boot. When you restart, it will do a check before get to the login screen. Partitions or other drives can also be checked this way.

Method 7. Reinstall DirectX

This can be the fix for games that won't load. The way to do this depends on your version of Windows and which version of DirectX you need. There are full instructions on Microsoft's website

Hope it's help you. :-)

In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?​

Answers

Answer:

Byte Short Int Long

Explanation:

Byte's 8 bit, short's 16, int's 32, and long's 65.

How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to access than the library. They provide only information from reliable sources. They provide immediate access to information on the web. They take longer than using a card catalog but provide only expert sources.

Answers

Answer:

because it is easy to access not hard not all things from the internet are reliable they don't always have expert sources

Explanation:

Search engines like Google, Bing, and Yahoo! have revolutionized research.

The best answer choice for this is that "they provide immediate access to information on the web".

The other choices would be wrong because...

Answer choice A, would be incorrect due to the fact that using the search engines makes it easier to access information than a library as you do not need to walk around the library looking for a book to provide you the answers to your question.

Answer choice B, would be false since the web doesn't always provide only reliable information from creditable sources. In fact, quite a few of the sources on the web that come up, are not helpful or do not assist the user in answering their questions.

Answer choice D, would be wrong since using the search engine to find information is quicker than using a card catalog, and also it does not only provide expert sources since any source of information could pop up when the user searches for it.

What is the features of Mark 1​

Answers

Answer:

Okay:

Mark I was enourmous in size, measuring 8 feet high, 51 feet long and three feet deep. It weighed 5 tons, used 530 miles of wire and 730,000 separate parts. The operation of these parts was powered and synchronized by a long horizontal rotating shaft. A four horsepower engine drives the mechanical parts.

Harvard Mark I, an early protocomputer, built during World War II in the United States. While Vannevar Bush was working on analog computing at the Massachusetts Institute of Technology (MIT), across town Harvard University professor Howard Aiken was working with digital devices for calculation. He had begun to realize in hardware something like the 19th-century English inventor Charles Babbage’s Analytical Engine, which he had read about. Starting in 1937, Aiken laid out detailed plans for a series of four calculating machines of increasing sophistication, based on different technologies, from the largely mechanical Mark I to the electronic Mark IV.

Explanation:

hope it is helpful to you

When testing for current in a cable with eleven ​color-coded wires, the author used a meter to test five wires at a time. how many different tests are required for every possible pairing of five ​wires?

Answers

Multiply 5 times 5, then times 11, and you'll get 275.

Write a program that keeps names and emails addresses in a dictionary as key-value pairs. First print all keys with their value using for loop.then the program should display a menu that lets user look up a person’s email address, add a new name and email address, change an existing email address and delete an existing name and email address

Answers

The program keeps names and email addresses in a dictionary as key-value pairs, as written below.

What are codes?

Codes are the language that is used to write programs.

f=open('email.dat','rb')

  d=pickle.load(f)

  f.close()

except:  

  d={}

while True:

  print('\n1. Find a email address')

  print('2. Add name and email address')

  print('3. Change an email address')

  print('4. Delete an email address')

  print('5. Exit\n')

  choice=input('\nEnter a choice: ')

  if choice:

      choice=int(choice)

  else:

      print('\nEnter a number')

      continue  

  if choice == 1:

      while True:

          name=input('\nEnter the name ')

          if name:

              if name in d:

                  print('\n%s is the email id of %s \n' % (d[name],name))

                  break

              else:

                  print('\n Email not found \n')

                  break

          else:

              print('\nName cannot be empty\n')

              continue

  elif choice==2:

      while True:          

          name=input('\nEnter the name ')

          if name:

              break;

else:

              print('\nName cannot be empty \n')

              continue

      while True:          

email=input('\nEnter the email address ')

          if email:

              d[name]=email

              break

          else:

              print('\nEmail cannot be empty\n')

              continue

        elif choice==3:

      while True:          

          name=input('\nEnter the name to change the email address ')

          if name:

              if name in d:

                  email=input('\nEnter the new email address ')

                  d[name]=email

                  print('\nEmail address changed \n')

                  break;

              else:

                  print('\nName not found \n')

                 break

          else:

              print('\nName cannot be empty \n')

              continue

  elif choice == 4:

      while True:          

          name=input('\nEnter the name to remove ')

          if name:

              if name in d:

                  del d[name]

                  print('\nName and Email address removed \n ')

break;

              else:

                  print('\nName not found \n')

                  break

          else:

              print('\nName cannot be empty\n')

continue

  elif choice == 5:

      f=open('email.dat','wb')

      pickle.dump(d,f)

      f.close()

      sys.exit()

  else:

      print('\nEnter a valid choice ')

Therefore, the codes are written above.

To learn more about codes, refer to the link:

https://brainly.com/question/28848004

#SPJ5

______ greetings are used when we talk to friends or family members.

A)Formal

B)Informal

C)Gestures

D)None of these​

Answers

Answer:

B. Informal

Explanation:

You know your parents, greet them normally

Answer:

Informal

Explanation:

Other Questions
Quarry Corp. has the following costs related to a mine it acquired this year. Cost of land and natural resource rights $200,000 Asset retirement obligation to restore land 50,000 Costs of extraction during year 1 35,000 Equipment used for mining 100,000 Exploration and drilling costs to prepare quarry for extraction 40,000 What amount should be included as an asset for natural resources What is not an example of toxic waste?O adhesivesO plastic wrapO dry-cleaning sjafventsO herbicides A divorced woman with 2 young children has just re-entered the workforce part time and earns $3,000 from this work. She collects another $2,400 per year in alimony payments. The woman wishes to make a contribution to an Individual Retirement Account this year. Which statement is TRUE Read and choose the option with the correct conjugation to complete the sentence. Sandrita y Julin ________ al parque de atracciones. voy vas va van This month the company reported an increase in profit of 25%. If the company made $45,000 last month, how much did they make this month? A. $5,400 B. $5,625 C. $54,000 D. $56,250 J.C Coats Inc. carefully develops standards for its coat making operation. Its specifications call for 2 square yards of wool per coat. The budgeted price of wool is $50 per square yard. The actual price for the wool was $38 and the usage was only 1.6 yards of wool per coat. What would be the standard cost per output for the wool? THE FIRST TO GET IT RIGHT GETS A BRAINLIEST :) A three-digit number, XYZ, is formed of three different non-zero digits X, Y , and Z. A new number is formed by rearranging the same three digits. What is the greatest possible difference between the two numbers? (For example, 345 could be rearranged into 435, for a difference of 435 345 = 90.) a bag contains only red and blue counters the probability that a counter is blue is 0.58 A counter is picked at random What is the probability that it is red Why may a hotel charge high prices for wine,soft drinks or bottled water and quite reasonable prices for food and still get away with such high prices Read this passage from the Ramayana by R. K. Narayan. What cultural context is being explored in this passage? The King looked woebegone and desperate, and the sage relented enough to utter a word of comfort. You cannot count on the physical proximity of someone you love, all the time. A seed that sprouts at the foot of its parent tree remains stunted until it is transplanted. Rama will be in my care, and he will be quite well. But ultimately, he will leave me too. Every human being, when the time comes, has to depart and seek his fulfillment in his own way. Customs Values Setting Lifestyle Find the surface area of a cylinder with radius r = 6 and height h = 14.8 to the nearest tenth of a square cm. Use = 3.14 At a playground, two young children are on identical swings. One child appears to be about twice as heavy as the other. Part A If you pull them back together the same distance and release them to start them swinging, what will you notice about the oscillations of the two children Use your calculated discharge results to estimate the probability of flooding, using the following procedure: 1. Use the Annual Exceedance Probability Chart below (also in the Chapter 16 Investigation in your textbook or on the worksheet that corresponds to this exercise). Find the position of your calculated discharge to fill the notch on the vertical axis of the plot. 2. Draw a horizontal line from that value to the right until you intersect the probability line. 3. From the point of intersection, draw a vertical line down to the horizontal axis of the plot, read off the corresponding probability of exceedance, and choose the best answer below. The probability to fill the notch is: Now determine the probability of flooding of the middle terrace, using the same approach as before. Remember you must use the total amount of discharge required to fill the notch and bottomland up to the level of the middle terrace. Choose the best answer below. The probability of flooding the middle terrace is: Which layer in the model of Earth could be described as similar to oozing peanut butter moving slowly towards the surface when hot and falling back slowly towards the inner core when cool? Select one: a. The upper mantle b. The lower mantle c. The crust d. The lithosphere PLEASE HELP!!!!! Which of the following similarity statements is formattedcorrectly?Triangle MNO = PQRTriangle MNO ~ PQRTriangle MNO = Triangle PQRTriangle MNO ~Triangle PQR How to score good marks in exams of class 9th While calculating HCF using index notation, we choose ____________ index of common prime factors. The function h = -16t + 240t represents the height h (in feet) of a rocket t seconds after it is launched. The rocket explodes at its highest point. after how many seconds does the rocket explode How did the Zimmermann Telegram help push the United States into World War I? The Open Door policy was designed toA.keep the markets of China open to the United States.B.prevent the United States from being excluded from the China markets.C.all of the aboveD.protect American access to the China trade without resorting to war.