Arrange the following lifestyle factors in order from high to low in terms of their influence on the development of cancer.

Answers

Answer 1

Lifestyle factors can play a significant role in the development of cancer. Here is the arrangement of these factors preventable in order from high to low in terms of their influence:

Exposure to Carcinogens: Occupational or environmental exposure to carcinogens, such as asbestos, benzene, radon, and certain chemicals, can increase the risk of developing cancer. Taking necessary precautions, like wearing protective gear and following safety guidelines, can help minimize exposure.

It is important to note that these lifestyle factors are not mutually exclusive and can interact with one another. Adopting a healthy lifestyle by avoiding tobacco, consuming a balanced diet, staying physically active, limiting alcohol intake, and reducing exposure to carcinogens can greatly reduce the risk of developing cancer.

To know more about preventable visit:

https://brainly.com/question/12650221

#SPJ11

Answer 2

It is important to note that these factors may have different levels of influence depending on individual circumstances and genetic predisposition. Making positive changes in these lifestyle factors can significantly reduce the risk of developing

cancer

.

In terms of their influence on the development of cancer,

lifestyle factors

can be arranged from high to low as follows:

1.

Tobacco

use: Smoking and other forms of tobacco use are the leading cause of preventable cancer deaths worldwide.

Tobacco contains numerous harmful chemicals that can damage DNA and increase the risk of developing cancer, particularly lung, throat, and mouth cancer.

2.

Obesity

and poor diet: A sedentary lifestyle combined with a diet high in processed foods, unhealthy fats, and low in fruits and vegetables can contribute to the development of cancer.

Being overweight or

obese

increases the risk of several types of cancer, including breast, colorectal, and pancreatic cancer.

3. Alcohol consumption: Excessive alcohol consumption is associated with an increased risk of developing various types of cancer, such as liver, mouth, throat, and breast cancer.

The risk is higher for heavy drinkers.

4. Physical inactivity: Lack of regular physical activity can increase the risk of certain cancers, including colorectal and breast cancer.

Exercise helps maintain a healthy weight, boosts the immune system, and reduces inflammation, which can protect against cancer.

5. Sun exposure: Overexposure to ultraviolet (UV) radiation from the sun or tanning beds is a significant risk factor for skin cancer, including melanoma.

Learn more about:

cancer


https://brainly.com/question/11710623

#SPJ 11


Related Questions

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer? *

Answers

Answer:

D.  The packets may arrive out of order

Explanation:

The packets may arrive out of order, because some may take different pathways. Some paths being sorter and some being longer, causing a delay in when the packets are received.

The possibility of packet data arriving out of order is true.

When sending information from one computer to another through a server, the information being sent is called data and they are broken down into smaller chunks called packets.

These packets of data the move through internet severs along different pathways which are usually very different with unequal pathways.

Hence, data packets which travels through shorter pathways arrive their destination first before those on the longer trail.

Hence, packets are not always received in the order in which they were sent.

Explaining the other options :

Packets aren't sent back when they arrive out of order but are reassembled by the receiving computer.

The fact that a certain data packet does not reach their destination does not mean all other data packet will not.

Hence, the true statement is that data packet may arrive their destination out of order.

Missing Options from the question :

A. The packets will always be received in the order that they were sent

B. Either every packet will reach her computer or none of them will.

C. Packets that arrive out of order will be sent back to the server.

D. The packets may arrive out of order

Learn more : https://brainly.com/question/18729589?referrer=searchResults

would you rather be rich and unknown or famous and poor

Answers

Answer:

rich g

Explanation:

Need help with these

Need help with these

Answers

Answer:

10. B. False

11. D. All of the above

12. B. False

(I am not 100% sure on number 10, but I believe the rest are correct.)


The science of how an object reacts to its motion through air is called
(12 letters)

Answers

Answer:

The science of how an object reacts to its motion through air is called aerodynamics

Explanation:

Aerodynamics is the science 〔ç) of studying, designing, and manufacturing vehicles such that they can operate in atmospheric conditions. Aerodynamic efficiency has many aspects respect to generating flight including maneuverability and make use of minimum amount of fuel needed for lift. Aerodynamics also deal with the flow around objects or what a rotational fluid must do as it flows along a curved surface or moves past a blunt body that creates turbulence.

The science of how an object reacts to its motion through air is called aerodynamics.

What is motion?

Motion is the shift in such an item's location with regard to time. Translocation, the act or process of changing or shifting locations or positions. It is described as a movement that occurs repeatedly at set intervals of time.

The examination of forces and how they cause anything to move through the air is known as aerodynamics. We can estimate the strengths of lift, whose enable an aircraft to defy logic, and drag, that is the opposition an aircraft "feels" as it traverses the air, by observing the movements of the air over an item. By directing air in this method, a component referred as drag attributable to lift is created, which slows the forward speed of the aircraft.

Learn more about motion, here:

https://brainly.com/question/22810476

#SPJ2

By day 3 post an explanation of your assigned step of the research process and how you would completethat step.

Answers

let's assume that the assigned step of the research process is data collection. By day 3, you would need to explain how you would complete this step.  In the data collection step, you gather information and data to support your research objective.

To complete this step, you can start by determining the most appropriate method for data collection based on your research objectives and the type of data you need. Then, you would design your data collection tools, such as questionnaires or interview guides, ensuring they are clear and concise.

Once the data is collected, you would organize and analyze it. This could involve coding open-ended responses, entering data into statistical software, or applying qualitative analysis techniques. Finally, you would interpret the findings and draw conclusions based on the data collected.


To know more about research process visit :-

https://brainly.com/question/30542155

#SPJ11

A(n) ____________________ is a digital audio or video file that can be downloaded to a computer or watched on a smartphone.

Answers

A media file or a downloadable file is a digital audio or video file that can be downloaded to a computer or watched on a smartphone.These files are typically available in popular formats such as MP3, MP4, AVI, or MKV, depending on the type of content they contain.

Media files have revolutionized the way we consume entertainment, providing convenient access to a vast array of audio and video content. They can be legally obtained through various online platforms such as music streaming services, video-on-demand services, or online marketplaces.

Users can choose to purchase or rent these files, or sometimes access them for free through authorized channels.

The availability of media files in digital format has significantly enhanced portability and accessibility. Users can download their desired files onto their computers or smartphones and enjoy them at their convenience, even without an active internet connection.

This flexibility has empowered individuals to carry their favorite music tracks, podcasts, or videos with them wherever they go.

it is important to note that while media files can be shared, it is crucial to respect copyright laws and intellectual property rights. Unauthorized distribution or sharing of copyrighted material is considered plagiarism and can result in legal consequences.

For more such questions digital,Click on

https://brainly.com/question/30070060

#SPJ8

write any two uses of word processing software


Answers

Answer:

Editing , saving and printing document

Word processing software is a multi-purpose tool with several uses. Here are two examples:

Document Creation: Word processing software is largely used for document creation and editing.

It has an easy-to-use interface with features including formatting settings, spell checking, and the ability to integrate photos, tables, and other multimedia components.

Word processing software encourages collaboration by allowing numerous people to work on the same document at the same time.

Thus, it allows for real-time editing, commenting, and monitoring of changes, making team collaboration on projects easier.

For more details regarding software, visit:

https://brainly.com/question/32237513

#SPJ6

*
Which of the following variable names are invalid?
123LookAtMe
Look_at_me
LookAtMe123
All of these are valid

Answers

Answer:

I think they're all valid but the validility depends on the website your using the usernames on.

Explanation:

MARIE includes 4096 bytes of memory. If Marie memory is divided in four memory banks, how much is each memory bank? O 2K Bytes O 1K Bytes 4K Bytes Question 31 (X+Y)Z+W+ 1 results in 1 as the output. O True O False

Answers

Marie includes 4096 bytes of memory. If Marie memory is divided into four memory banks, The amount of memory in each memory bank is determined by dividing the total amount of memory by the number of memory banks.

As a result, each memory bank of 4096 bytes memory will have a size of 4096/4 = 1024 bytes.So, the answer to your question is 1K Bytes.Each memory bank will have a capacity of 1K Bytes.Note: (X + Y) Z + W + 1 results in 1 as the output has a False output. The given equation can be written as:XZ + YZ + W + 1 = 1XZ + YZ + W = 0The expression on the left-hand side of the equation cannot be equal to zero. So, the output is false.

Based on the given content, MARIE includes 4096 bytes of memory. If this memory is divided into four memory banks, each memory bank would have 4096 divided by 4, which is equal to 1024 bytes or 1K byte.

As for the second part, it seems to be a multiple-choice question with the expression (X+Y)Z+W+1 resulting in 1 as the output. Without further context or values assigned to the variables, it is not possible to determine whether the statement is true or false.

To know more about memory banks visit:

https://brainly.com/question/31567696

#SPJ11

You carried out a PERT analysis of a very large activity-event network using only slightly skewed or symmetric beta distribution models for the activity durations. Your analysis yields a mean duration of 56.2 time units for the critical path with a variance of 3.4. What is your best estimate of the probability of successful project completion in 57 time units or less? Provide your answer as a number between 0 and 1 with 3 decimals (3 digits after the decimal point, for example: 0.123).

Answers

PERT (Program Evaluation and Review Technique) is a network analysis technique commonly used in project management.

It is particularly useful when there is a high level of uncertainty surrounding the duration of individual project activities. PERT uses probabilistic time estimates, which are duration estimates based on using optimistic, most likely, and pessimistic estimates of activity durations, or a three-point estimate.

These estimates help to identify the likelihood of meeting project deadlines and can assist project managers in developing effective project schedules and resource allocation plans. Overall, PERT is an important tool for managing complex projects with uncertain activity durations.

To know more about project management, refer to the link:

brainly.com/question/4475646#

#SPJ4

If your internet home page has changed and a strange-looking search engine appears when you try to search the internet, what type of attack are you experiencing? group of answer choices

Answers

A redirect virus is the type of attack that the person is experiencing.

What is the internet?

Systems across the country are connected by a huge global network named the Internet. Individuals can exchange knowledge and converse via the Web of any device connected to The internet.

A piece of malware known as a “browser hijacker” affects browser-based options without any of the users knowing and drives them to pages they did not anticipate visiting. Since that leads the viewer to other, frequently harmful websites, it is frequently referred to as a window redirect pathogen.

Learn more about internet, here:

https://brainly.com/question/13308791

#SPJ1

database privileges can include all except which one:alterpurgedropexecute

Answers

The database privilege that does not belong to the list is "purge" as  "purge" is not typically considered a standard database privilege. The term "purge" is often used in the context of deleting or removing data from a database, but it does not represent a specific privilege in most database management systems.

Generally, database privileges are permissions or rights granted to users or roles within a database system. These privileges determine what actions users can perform on the database objects, such as tables, views, procedures, and functions. "Alter" privilege allows users to modify the structure of existing database objects. For example, with the "alter" privilege, a user can add or remove columns from a table, modify table constraints, or change the definition of a stored procedure. In most database management systems, "purge" is not considered a standard privilege

Learn more about privilege here

https://brainly.com/question/30038900

#SPJ1

When an "is a" relationship exists between objects, it means that the specialized object has Group of answer choices Some of the characteristics of the general object, but not all Some of the characteristics of the general class, but not all, plus additional characteristics None of the characteristics of the general object All the characteristics of the general object, plus additional characteristics

Answers

Answer:

All the characteristics of the general object, plus additional characteristics

Explanation:

In case when an is a relationship exists between objects. Here is a relationship refers to a relationship in which there is a reference of one class to another class.

So this represent that the specialized object contains all the attributes of a general object along with it it also involved the extra attributes

Hence, the last option is correct

The extent to which information contained on one level of a set of nested data-flow diagrams is also included on other levels refers to: A. DFD gap proofing. B. DFD flexibility. C. DFD completeness. D. DFD cohesion. E. DFD consistency.

Answers

The extent to which information contained on one level of a set of nested data-flow diagrams is also included on other levels refers to: C. DFD completeness.

DFD completeness refers to the degree to which information flows are accurately represented and captured in all levels of a nested data-flow diagram. It ensures that no essential information is missing or overlooked when transitioning from one level to another. In a well-designed data-flow diagram, each level builds upon the previous one, providing a more detailed and comprehensive view of the system's information flow.

At each level of a nested data-flow diagram, the information should be consistent and complete with the higher-level diagrams. This means that the lower-level diagrams should include all the necessary information to ensure a clear understanding of how data is processed and transformed within the system. If there are gaps or missing information between levels, it can lead to confusion, inaccuracies, and potential errors in system analysis and design.

By maintaining DFD completeness, organizations can ensure that their data-flow diagrams accurately represent the system's functionality and help stakeholders understand how information moves through the system. It aids in effective communication, requirements gathering, and system analysis, leading to more efficient and reliable system development.

Nested data-flow diagrams play a crucial role in system analysis and design. They help break down complex systems into manageable levels, providing a detailed view of the information flow. DFD completeness ensures that the information captured at each level is consistent, accurate, and comprehensive, helping stakeholders and developers make informed decisions.

Learn more about data-flow

brainly.com/question/31765091

#SPJ11

There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:


A[0] = 1

A[1] = 2

A[2] = 3

A[3] = 4

A[4] = 5


Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1

Answers

The Java code that solves this problem has been written in  the space below

How to write the Java code

public class Solution {

   public int solution(int[] A) {

       int totalLoad = 0;

       for (int load : A) {

           totalLoad += load;

       }

       int server1Load = 0;

       int server2Load = totalLoad;

       int minAbsoluteDifference = Integer.MAX_VALUE;

       for (int i = 0; i < A.length - 1; i++) {

           server1Load += A[i];

           server2Load -= A[i];

           int absoluteDifference = Math.abs(server1Load - server2Load);

           minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);

       }

       return minAbsoluteDifference;

   }

}

Read mroe on Java code here https://brainly.com/question/25458754

#SPJ1

Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly

Use the drop-down menus to complete statements about safe and blocked senders lists.*Safe *Blocked *repeatedly

Answers

Answer:

it already has an answer and it's right so i don't see the point to needing to answer this

Do you think employers are impressed with someone who knows how to use Excel? Why or Why not?

Answers

Answer:

Explanation:

Yes, but it depends on who your applying your job for. If it's a computer based job than they will be impressed.

Sarah is having a hard time finding a template for her advertising buisness that she mah be able to use at a later date and also make it availible to her colleagues, What is her best option?​

Answers

Answer: create a custom template

Explanation:

Since Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later date and also make it available to her colleagues, her best option will be to create a custom template.

Creating a custom template will ensure that she makes the template based on her requirements and can tailor it specifically to her needs which then makes it unique.

Which image format is commonly used for digital photos, and web and print publishing?.

Answers

The image format that is commonly used for digital photos, web, and print publishing is the JPEG format.

JPEG stands for Joint Photographic Experts Group, which is the organization that developed this format. JPEG is a lossy compression format, which means that it reduces the file size of an image by removing some of the image data. This compression allows for smaller file sizes, which makes JPEG a popular choice for storing and sharing digital photos.

One of the advantages of JPEG is that it can display millions of colors, making it a good choice for images that have a wide range of colors, such as photographs. JPEG also allows for high-quality compression, which means that the image quality can be reduced significantly without a noticeable loss in image quality.

To know more about image format,

https://brainly.com/question/27886665

#SPJ11

true or false: more than one leed rating system may apply to a project, in which case a 3rd party certifier must decide the appropriate rating system the team should pursue.

Answers

More than one LEED rating system may apply to a project, in which case a 3rd party certifier must decide the appropriate rating system the team should pursue.LEED (Leadership in Energy and Environmental Design) rating systems are used to evaluate the environmental performance of a building or community. Each LEED rating system is tailored to a specific project type.

For example, the LEED for New Construction rating system is used to assess the environmental performance of new construction projects, while the LEED for Existing Buildings rating system is used to evaluate the environmental performance of existing buildings.There are several LEED rating systems available, and in some cases, more than one rating system may be applicable to a project.

In these situations, a third-party certifier must decide which rating system the project team should pursue. The certifier will take into account the project type, the project location, and other factors when making this decision.

TO know more about that appropriate visit:

https://brainly.com/question/29866021

#SPJ11

What is the name of the box into which a cell address can be entered?

quick access box
autobox
cell address box
name box

Answers

The name box displays the address of an active cell on a worksheet.

which form of online communication happens in real time?

Answers

Answer:

texting? it happens in real time and is online.

Write 3 paragraphs for the following questions:
What is assistive technology? What types of learning problems can assistive technology address? Identify several assistive technology devices that can address these problems.

Answers

Answer:

Explanation:

What are some types of assistive devices and how are they used?

Some examples of assistive technologies are:

Mobility aids, such as wheelchairs, scooters, walkers, canes, crutches1, prosthetic devices, and orthotic devices.2

Hearing aids to help people hear or hear more clearly.3

Cognitive aids, including computer or electrical assistive devices, to help people with memory, attention, or other challenges in their thinking skills.3

Computer software and hardware, such as voice recognition programs, screen readers, and screen enlargement applications, to help people with mobility and sensory impairments use computers and mobile devices.4,5

Tools such as automatic page turners, book holders, and adapted pencil grips to help learners with disabilities participate in educational activities4,6,7

Closed captioning to allow people with hearing problems to watch movies, television programs, and other digital media.4

Physical modifications in the built environment, including ramps, grab bars, and wider doorways to enable access to buildings, businesses, and workplaces.8,9

Lightweight, high-performance mobility devices that enable persons with disabilities to play sports and be physically active.4

Adaptive switches and utensils to allow those with limited motor skills to eat, play games, and accomplish other activities.4

Devices and features of devices to help perform tasks such as cooking, dressing, and grooming; specialized handles and grips, devices that extend reach, and lights on telephones and doorbells are a few examples.4

For more information about types of assistive devices, check out the following resources

Explain the different types of computer software programs. Be specific and use examples

Answers

Answer:

There are two types of computer software:

1. System Software

2. Application Software

System Software:

These are the programs that are designed to maintain and operate a computer system and manage the hardware.

System software includes :

1. Utility software

2. Operating System

The Utility software are types of programs that can carry out configuration and maintenance tasks. Ex : Compression software, Formatting software, Disk defragmentation software or backup software.

The operating system provides the user with a User Interface to manage the hardware of the computer.

The operating system can perform these tasks :

1. Memory management

2. Managing security

3. Resource management

4. Print spooling

5. Error handling

Applications software :

This type of software allows the user to carry out specific tasks.

Ex : word processing software, spreadsheet software, database management software

Different software programs include, among others, system software, application software, programming software, driver software, etc.

A software program refers to a set of instructions used by a computer to perform a specific operation.

Computer software programs are generally classified into two types: operating systems and application software.

Operating systems are software programs that generate the interface between the hardware and the user.

Moreover, application software programs are computer programs that perform specific tasks other than one relating to the functioning of the computer itself.

In conclusion, different software programs include, among others, system software, application software, programming software, driver software, etc.

Learn more in:

https://brainly.com/question/4560046

What is fish processing?

Answers

Fish processing involves preparing fish and seafood for delivery to consumers. Once fish is harvested, it must undergo several steps before it’s ready to be sold in the market. The process includes gutting, filleting and packaging of the product. Fish is a highly perishable food, so it must be carefully handled from the moment it’s caught until it’s sealed in packaging material

typical process description tools include . a. context diagrams b. decision trees c. pseudocode d. database tables

Answers

Typical process description tools are designed to help businesses and organizations better understand their processes and identify areas for improvement. These tools often include context diagrams, decision trees, pseudocode, and database tables.

A context diagram is a visual representation of a system that helps identify its boundaries, inputs, and outputs. It is a high-level overview of the system and provides a clear understanding of how the system interacts with its environment.

Decision trees are graphical representations of decisions and their possible consequences. They are useful for evaluating different options and determining the best course of action.

Pseudocode is a language-independent way of describing a computer program. It is a step-by-step outline of the logic behind the program and helps developers identify potential errors and optimize their code.

Database tables are used to organize and store data in a structured format. They provide a way to access, analyze, and manipulate data in a way that is both efficient and accurate.

Overall, these process description tools are essential for businesses and organizations that want to improve their processes and increase their efficiency. By using these tools, they can identify areas for improvement and develop strategies to streamline their operations, reduce costs, and improve customer satisfaction.

Learn more about database here :-

https://brainly.com/question/30163202

#SPJ11

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

Complete the sentence with the correct response.
____ filtering is the minimum function a firewall can perform and still be considered a firewall.

Answers

Packet filtering firewall is the minimum function a firewall can perform and still be considered a firewall.

What is the firewall about?

Packet filtering is a basic function of a firewall that is used to control the flow of incoming and outgoing network traffic based on specified rules. The firewall inspects each incoming and outgoing network packet and either allows or blocks it based on its origin, destination, and type of data it carries.

Therefore, this kind of firewall uses rules to determine which packets to allow or block based on the packet's source and destination addresses, port numbers, and other information such as protocol type. This allows administrators to control the flow of traffic into and out of the network, and to prevent unauthorized access and potential security threats.

Learn more about firewall from

https://brainly.com/question/3221529

#SPJ1

What are some things you noticed while listening to podcast?

Answers

Answer:

is this like an actual question?

Explanation:

if so something I have noticed when I listen to podcasts is how much I relate to it

NEED HELP ON TEST!!!
Select the correct answer from each drop-down menu.
How can you refer to additional information while giving a presentation?

__1__will help you emphasize key points on a specific slide. The Notes section is only __2__ to you in the slide view and not in the main Slide Show view.

1. speaker notes,
slides,
handouts
2.invisible,
visible,
accessible​

Answers

Answer:

\(1. \: speaker \: notes \\

2. \: accessible\)

How can you refer to additional information while giving a presentation?

(Answer below )

(Speaker notes) will help you emphasize key points on a specific slide. The Notes section is only (accessible) to you in the Slide view and not in the main Slide Show view.

Learn more about speaker notes here

https://brainly.com/

#JP42

Other Questions
An airplane starts from west on the runway. The engines exorta constant force of 78.0 KN on the body of the plane (mass 9 20 104 KO) during takeofc How far down the runway does the plane reach its takeoff speed of 46.1m/s? Round 2.46 to the nearest whole number What would happen to the magnitude of the force if the distance between the 2 masses is decreased by 6? Why are metals alloyed? How many atoms would 50 grams of copper have? x^2-6x-3=(x-a)^2-b where a and b are constants.Find the values of a and b It takes five hours to make each swimsuit. Employees are paid at $6,00 per hour. How much will the budgeted labor cost be if 100 units are manufactured? 10000 The exhibit is dedicated to celebrating the individual talents and cultures of Native American women artists. These inspirational female artists are finally getting their time to shine.The author's purpose for including this passage was to __________.A. criticize exhibits that do not celebrate individual artistsB. explain why the exhibit focuses only on Native American artC. persuade the reader to visit exhibits of Native American artD. explain the purpose of the exhibit and what makes it unique Maggie Enterprises issued $100,000 of 6%, five-year bonds with interest payable semiannually. Determine the issue price if the bonds are priced to yield (a) 6%, (b) 10%, and (c) 2%. Pls help grades close today Ill brainlest neurotransmitters bind to receptors located on the , which is/are primarily responsible for receiving information from other neurons. If XYZ Co. has an annual cashflow of $1,000,000,000.00, and the shares of a similar company is trading at a multiple of 10 times cashflow, XYZ shares would be valued at dollars per share if XYZ has 100,000,000 shares outstanding. Which recent changes have led to the decline of Cajun culture in Louisiana? Check all that apply.The sale of public lands has disrupted the Cajun homelands.The bayou wetlands are growing increasingly endangered.Fewer young people are learning the Cajun language. Fishing and shrimping are threatened by environmental changes. Many young people are moving to larger cities to find employment. Why does Mrs. Linde say she doesn't care about the letter? Each square below represents one whole. What precent is represented by the shaded area!!! PLEASE HELP!!! given that f(x) = 3x + 5, find f(x+2) according to theory, what is labeled deviance and what is controlled and/or punished represents the interests of the wealthy and powerful. List 5 words in English that have the sound of each of your vocales - for example 'a' octagon. You should submit 25 words Also, list 5 words that have the sound or 'rr' '' & 'll' Submit 5 more for a total of 30 words.Vowels are a,e,i,o,u the total charge of an atom comes from a) protons only b) neutrons only c) protons and neutrons d) protons and electrons ABWhy do differentspecies oforganisms lookdifferent?They want to have individuality.They live in different environments and havedifferent adaptations. This