What are recommended practices when practicing a speech using presentation technology?

Answers

Answer 1

The recommended practices when practicing a speech using presentation technology are:

Decide exactly when to change slidesRehearse with the mouse or keyboard until their use requires only a glance at the equipmentMark cues in the speaking notes to indicate slide changes

What is meant by the act of giving a presentation?

When a person is known to often gives a presentation, they are seen to often give a formal talk.

Note that  a lot of times, in order to be able to pass or sale something or get support for what we calla proposal. One need to use a Powerpoint presentation of what is to be done.

Hence, The recommended practices when practicing a speech using presentation technology are:

Decide exactly when to change slidesRehearse with the mouse or keyboard until their use requires only a glance at the equipmentMark cues in the speaking notes to indicate slide changes

Learn more about presentation from

https://brainly.com/question/24653274

#SPJ1


Related Questions

If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?

Answers

The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

Which device is used to transfer data from one place to another?

The device that is often used is known to be an External Hard Drives or the use of Media Devices for big Data Transfers.

Note that Copying data into an external hard drives, flash drives, or other kinds of storage devices is said to be another way that is often used in the transfer of data.

Moving specific files or backing up the full system from one computer to another is known to be very quick and easy.

Therefore, The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

Learn more about error message from

https://brainly.com/question/25671653

#SPJ1

Can traps be generated intentionally by a user program? if so, for what purpose?

Answers

Traps be generated intentionally by a user program and It  is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.

Can a user program cause a trap?

A trap is known to be one that can be used to be able to make or one that is gotten if a user program create a definite service request via the use of the OS.

Note that  Traps are known to be a kind of synchronous events as to the fact that the passing of the present instructions are said to be very likely leads to traps.

Hence, Traps be generated intentionally by a user program and It  is one that can be used in the act of call operating system routines or it is one that is used to catch arithmetic errors.

Learn more about program from

https://brainly.com/question/1538272

#SPJ1

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem

Answers

If your computer seems to be running slowly, the things that a person  should you do to troubleshoot the problem is that  one  should use the Task manager as it can display CPU utilization graphs in regards to eight processors.

What troubleshooting meaning?

Troubleshooting is known to be a term that is seen as a form of a systematic approach to problem-solving.

Note that it is one where or which is said to be used to find and alter or correct issues that are in regards to complex machines, electronics, computers and also that of software systems.

Hence, If your computer seems to be running slowly, the things that a person  should you do to troubleshoot the problem is that  one  should use the Task manager as it can display CPU utilization graphs in regards to eight processors.

Learn more about troubleshoot from

https://brainly.com/question/14394407

#SPJ1

What key technological breakthrough accompanied the transition to the print and electronic eras? why were these changes significant?

Answers

The printing press is the key technological breakthrough that accompanied the transition to the print and electronic eras and it was significant that helped to foster a feeling of nationalism and nourished an idea of individualism.

What was the printing press?

It means the device that allows for the mass production of uniform printed matter mainly text in the form of books, pamphlets, newspapers etc.

In India, their independence from the British was fueled by the feeling of nationalism that was spread by the newspaper which was very cheap medium of communication.

Hence, this device was key technological breakthrough that accompanied the transition to the print and electronic eras and it was significant that helped to foster a feeling of nationalism and nourished an idea of individualism.

Read more about printing press

brainly.com/question/1461733

#SPJ1

Bob is making a short film for an international film festival. he wants to store audio, video, and subtitle files together in a single file. which file format should he use to store such a video?

Answers

MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.

What is MOV?

The brevity of a short film exists in what creates it and what it stands for. Although they range in length, purpose, and genre, they all desire to do the same things: save money corresponded to a feature film, increase professional attention, and practice telling shorter, more attentive stories before moving on to feature films.

A short film stands typically defined as a movie that is up to 50 minutes long, while there exists no set length need in Hollywood. That stated, the typical duration exists 20 minutes. A short movie may be computer-animated, or both.

MOV stands for a video format that was created by Apple. It's a MPEG 4 video container file that exists primarily utilized with Apple's QuickTime program. A MOV video can hold many various video formats and multimedia audio, video, and text — in the same file on separate tracks.

MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.

To learn more about file format refer to:

https://brainly.com/question/24102638

#SPJ4

Computers run three main types of software: application software, development tools, and _______ software

Answers

the answer is programming software

Which ntfs feature allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits?

Answers

The NTFS feature that allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits is Disk quotas.

What is Disk Quotas used for?

This refers to the feature in an NTFS system that allows to track how much data is used on the file system by a user and potentially apply storage limits.

Hence, we can see that based on the given question, the NTFS feature that allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits is Disk quotas.

This helps to allocate space limits to each sector so that the data can be easily tracked and this is an important NTFS feature.

Read more about NTFS here:

https://brainly.com/question/14178838

#SPJ1

Which principle or element of layout design is highlighted in this event poster?
i. a headline
ii. a column
iii. a sub-headline
iv. a caption

Answers

The  principle or element of layout design is highlighted in an event poster in option i: The headline.

What are the elements of page layout?

The poster is known to be one that often uses a kind of hierarchy and centered text alignment as its element.

Note that it is one whose Lines of use is said to be made up of different kinds of type styles, sizes and others.

The simple elements of an advertising poster is made up of:

1. The headline.

2. The sub-head.

3. The body copy.

4. The caption.

The elements of page layout are visual hierarchy, visual flow, and others. Hence, the  principle or element of layout design is highlighted in an event poster in option i: The headline.

Learn more about layout design from

https://brainly.com/question/2501083

#SPJ1

What is the importance of system security within the organization where you currently work or at an organization within your field of study

Answers

The  importance of system security within the organization where you currently work  is that It acts to protects the organization's strength to function in its full capacity without interference.

What is the importance of system security within an organization?

It helps in the safe operation of all firm's applications that are known to be implemented on the firm's IT systems. It also protects the data of the organization of which they often collects and use.

Note that In any business, the use of system security is vital for the safety of data and information in regards to the business and that of its clients. Hence, it helps to bring about the efficiency in the running of the company, and it keep safe the IT infrastructure assets.

Therefore, The  importance of system security within the organization where you currently work  is that It acts to protects the organization's strength to function in its full capacity without interference.

Learn more about system security  from

https://brainly.com/question/25720881

#SPJ1

The __________________ family of amd processors has processors that run up to 3.2 ghz, have up to 6 cores, and use the am3 socket.

Answers

Answer:

anthlon or fx processors

A computer is completely compromised when it won't turn on or operate. what is the best way to fix it?

Answers

Answer: Check to make sure it is plugged into the wall first . or that the power cord is plugged into the laptop and the laptop is charged up.

Explanation:

1. (If you are on a desktop, you need to have it plugged in at all times.)

2. (On a desktop you may need a new power supply or fan if it is an old enough machine, the power supply can be replaced if that does not work you may need a new motherboard or processor chip ..you can test it with a second power supply.

3. Oh, do you have enough ventilation inside the case is the fan working on the back of the case, and are the vents on the front clogged ?? A machine needs free-flowing air from the front to back to cool down the hard drive and the DVD or cd rom players as well as the MB. Use canned air and clean those vents and spray that air everywhere inside the desktop tower ...

4. Age is also a factor when a machine gets too old it will slow down and take longer to come on till one day it just stops.

5.. ( On a desktop, you have the CMOS battery on the MB that helps keep the machine running it is the size of a watch battery and you can get it at the local store.

6.. That battery (CMOS) needs to be replaced at least once a year as it controls your time and date and the year as it is imperative to work on your motherboard for peak performance.

7. You may have a virus,use an antivirus, like AVAST and try to add it on a USB thumb drive to clean the machine outside of windows or mack

The structure theorem states that it is possible to write any computer program using only ________ basic control structures

Answers

Answer:

three

Explanation:

Structured programming is based on three control structures: sequence, selection, and repetition. The structure theorem states that any program can be written using only three control structures.

What are the steps required to teach a dog the care (aka wellness check) command?

Answers

The steps required to teach a dog the care (aka wellness check) command is given below

What are the steps required to teach a dog command?

The ways to Teach Your Dog are:

Instruct the dog to  sit. then teach your dog the command Make the dog aware of the treat.Do Give a reward. Increase the level of difficulty.Implement the care command. Remove the treat. Then Switch hands.

What is Wellness check?

In the United State, a wellness check is known to be a kind of an in-person visit that is often made in response to a request from a friend or family member who is known to be concerned about the person's state  of mental health and in this case the dog.

Learn more about wellness check from

https://brainly.com/question/875455

#SPJ1

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. she wants to use a stationary print medium that commuters can see from a distance. which print medium should felicity choose?

Answers

It can be print medium to be determined by the felicity should be Billboard. Therefore, option (D) stands correct.

What is billboard?

Billboard exists an American music and entertainment magazine published weekly by Penske Media Corp. The magazine furnishes music charts, news, video, opinion, reviews, circumstances, and styles connected to the music industry.

Billboard exists a hoarding and huge outdoor advertisement board That can be visited by many people. To be seen by most automobiles and pedestrians, billboards stand frequently erected in busy areas like highways and urban areas.

Many companies publish their brands and products on the billboard for extending brand awareness and spreading the word about their company to as many individuals can know about the product.

According to the above scenario, Felicity can capture the awareness of the regular subway commuters in her area via billboard advertisement. From a distance, commuters can notice the advertisement.

Therefore, it can be print medium to be determined by the felicity should be Billboard. Therefore, option (D) stands correct.

The complete question is,

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?

(Correct answer only)

A. magazine

B. newspaper

C. flier

D. billboard

E. brochure

To learn more about billboard refer to:

https://brainly.com/question/3391907

#SPJ4

What is the difference between the as-is process model and the to-be process model?

Answers

AS-IS and TO-BE are phases of BPM (Business Process Management), which allow promoting the improvement of business processes. Therefore, there are two moments: the AS-IS and the TO-BE.

AS-IS is the view of an organization's current processes, which shows how a company performs its activities at a given time. It is common for the term AS-IS to be used synonymously for process analysis.

In AS-IS process analysis, processes are discovered and analyzed. It is time for exploration to create a common vision of the ruptures and deviations in the process.

AS-IS helps in discovering various types of business processes, whether they are primary processes, support processes or management processes.

TO-BE is the vision of an organization's future processes, which shows the best way to carry out the process. TO-BE is also called process design. Its objective is to propose improvements in the organizations' processes, based on what was verified in the AS-IS.

The design of TO-BE processes involves defining the workflow, roles and responsibilities, technologies required for the process, data sources and moments of integration with other processes. The great achievement of TO-BE is to promote real conditions of transformation in processes, improving the organization's competitiveness.

See more about computing at: brainly.com/question/1394311

#SPJ1

If html is used to specify the content of the webpage, then what do you use css for?

Answers

If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.

What is the uses of CSS?

Cascading Style Sheets can be regarded as one that  is been used in  styling as well as in  layout web pages .

When there is a need to  perform some actions such as :

alter the font color size  spacing of  contentsplit it into multiple columns

Then CSS comes into play , hence, If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.

Learn more about CSS on:

https://brainly.com/question/16397886

#SPJ1

What is the best to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed?

Answers

The best time to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed is;

Total treatment time for the day - total event or service-based units of the day= total time for time-based units.

What is Time Constraint?

The term time Constraint is known to be a word that connote or that defines some factors that hinders a projects in regards to time.

Note that this is made up of deadlines, workload management, and others such as resource allocation. a person  that has worked on a project is one that needs to deal with some constraints when it came to project execution.

Hence, The best time to calculate units total treatment time for day, remembering the total treatment time constrains the number of units to be billed is;

Total treatment time for the day - total event or service-based units of the day= total time for time-based units.

Learn more about time constrains from

https://brainly.com/question/6073946

#SPJ1

A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?

Answers

In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.

What is sniffing?

In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.

A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.

Thus, the correct option is a. Sniffing.

To learn more about sniffing, refer to the below link:

https://brainly.com/question/17100775

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. Sniffing

b. Spoofing

c. Hijacking

d. Impersonation

What is the practice of tagging pavement with codes displaying where wi-fi access is available?
a. bad actor
b. actor war
c. chalking war
d. driving

Answers

The practice of tagging pavement with codes displaying where wi-fi access is available is generally known as: c. war chalking.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, war chalking simply refers to a practice that typically involves tagging pavement with codes which displays where wi-fi access is available.

Read more on Wireless network here: https://brainly.com/question/13697151

#SPJ1

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?

Answers

A network monitoring method (technique) which can be used to ensure that all traffic sent to any port on a switch is also sent to a network device that is connected to the mirrored port is referred to as port mirroring.

What is a content switch?

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

What is port mirroring?

Port mirroring can be defined as a network monitoring method (technique) which is designed and developed to ensure that all traffic that are sent to any port on a switch, is also sent to a network device that is connected to the mirrored port.

In this context, we can infer and logically deduce that the network monitoring method used is referred to as port mirroring.

Read more on switches here: brainly.com/question/14850209

#SPJ1

Complete Form 1040 for Jill Donnovan using the tax forms and information provided. Submit the completed Form 1040.

Write a paragraph describing your experience completing Jill's personal tax document. What was easy about the process? What was confusing? How confident are you in the completed document? Be sure to include whether Jill will receive a refund or owe additional taxes. Write using complete sentences and correct grammar and mechanics.

KEYBOARDING

Answers

The correct answer is  I do not have access to any specific tax forms or information provided by any individuals. Therefore, I am unable to complete Form 1040 for Jill Donnovan or provide any specific details regarding her tax document. However, I can provide some general insights into completing tax documents.

Completing a personal tax document can be a tedious process, but it can also be straightforward if you have all the necessary information at hand. The process becomes easy if you have a clear understanding of the tax laws and regulations and the guidelines provided in the tax form instructions. However, it can be confusing if you encounter unfamiliar terms or complex calculations. In terms of confidence, it is essential to double-check all calculations and ensure that all the information provided is accurate before submitting the completed tax document. Any errors or discrepancies may lead to potential penalties or audits. The amount Jill will receive in a refund or owe in additional taxes will depend on various factors, such as her income, tax deductions, and credits. Therefore, I cannot speculate on her specific situation. However, it is always a good idea to consult with a tax professional or use reputable tax software to ensure accurate completion of tax documents

To learn more about documents click on the link below:

brainly.com/question/13406067

#SPJ1

Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent this situation from occurring?

Answers

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

Lack of authentication in company security. Access control-linked misconfigurations.A Software misconfigurations.

What could a back-end developer do to prevent this situation from occurring?Always Encrypt sensitive data: Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

https://brainly.com/question/10450768

#SPJ1

Why might contracting with multiple ISPs still fail to provide highly available Internet access infrastructure?

Answers

The act of contracting with multiple ISPs still fail to provide highly available Internet access infrastructure because it is still using the same level of ISPs.

What is multiple ISP?

This is known to be a kind of a routers that gives room for a user or a person to be able to have an Internet connection sing or from two different kinds of ISPs.

Note that by so doing, if one is known to fails, a user can still have access to the other.

Note also that a person can be able to configure the first connection as the main one or the primary and the other is known to be used as a backup connection.

Therefore, The act of contracting with multiple ISPs still fail to provide highly available Internet access infrastructure because it is still using the same level or type of ISPs.

Learn more about ISPs  from

https://brainly.com/question/27118899

#SPJ1

True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.

Answers

Hey there i hope you having a great day
The Answer is: False

You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on the physical address that it reads, the device then forwards the data out one of its ports to reach the destination device. What type of device are you using

Answers

You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on the physical address that it reads, the device then forwards the data out one of its ports to reach the destination device. The type of device you are using is router.

What is Router?

A router is an hardware device that is used in transferring information or data from a system to another.

The data can also be transfered from one computer networks to another.

Router makes it easier for more than one device to be connected easily without difficult Internet access.

Therefore, The type of device you are using that reads incoming data that travels along network cables is router.

Learn more on router below

https://brainly.com/question/24812743

#SPJ1

A technician wants to replace a failing power supply on a high-end gaming computer. which form factor should the technician be looking for?

Answers

A technician need to use the form factor or the  technician be looking for what we call EPS12V.

What is an EPS power connector?

The EPS connector is known to be used to supply power to the  motherboard CPU socket and the PCI is known to be one that functions to express connector.

Note that this is said to be a server standard (EPS12V) and it is also known to be one that can be said to be a desktop standard (ATX12V).

Note that the EPS12V is one that is known to always be seen in an 8-pin CPU connector and therefore, A technician need to use the form factor or the  technician be looking for what we call EPS12V.

Learn more about technician from

https://brainly.com/question/2328085

#SPJ1

If the cpu is fast but the bus speed is slow, that condition is called?

Answers

A slow processors but the need more bytes

Cloud suites are stored at a(n) ________ on the internet, rather than on your microcomputer. group of answer choices blog site macrocomputer pod site server

Answers

Cloud suites are stored at a(n)  server on the internet, rather than on your microcomputer.

What is server?

The word server is known to be a kind of a network computer, computer program, or one can say that it is a kind of a device that is known to often helps to processes or work on requests from a client (such as client-server architecture).

Note that On the World Wide Web, for example, a Web server is  known to be a kind of a computer that makes use of the HTTP protocol to be able to transmit or send Web pages to a client's computer if the client requests is said to be made to them.

Hence, Cloud suites are stored at a(n)  server on the internet, rather than on your microcomputer.

Learn more about Cloud suites from

https://brainly.com/question/27878893

#SPJ1

Answer:

sever

Explanation: i took the test and got it right!

Michael works for a graphic design firm. He is creating an informative poster. He needs to add a great deal of text in the poster. What tool will help him format the text?
Michael will use a ( blank)
tool to help format the text for creating an informative poster.

Answers

Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

What application is used for graphic design?

They are:

Adobe Photoshop Illustrator, GIMPCorelDraw Canva  and others

Based on the American Institute of Graphic Arts (AIGA), graphic design is known to be a term that is described as “the art and method of planning and bringing forth ideas and experiences along with the use of visual and textual content.”

Therefore, Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

Learn more about graphic design from

https://brainly.com/question/27019704

#SPJ1

which things computer case contains

Answers

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

What is a computer case?

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

Other Questions
You are performing a endospore stain on a gram-positive bacteria and that is not endospore forming. What will this look like at the end of the stain? Use part 1 of the fundamental theorem of calculus to find the derivative of the function. g(x) = x e5t2 4t dt 4 g'(x) = Read the chemical equation. n2 3h2 2nh3 using the volume ratio, determine how many liters of nh3 is produced if 1.2 liters of h2 reacts with an excess of n2, if all measurements are taken at the same temperature and pressure? The symbol X in the following equation, 23/11 Na + 1/1H 23/12 Mg + X, is a/an Must i argue the wrongfulness of slavery? is that a question for republicans? is it to be settled by the rules of logic and argumentation, as a matter beset with great difficulty, involving a doubtful application of the principle of justice, hard to be understood? what do the rhetorical questions in the excerpt suggest? douglass does not want to discuss slavery further. slavery is a highly divisive and complicated issue. douglass is uncertain about slaverys wrongfulness. the wrongfulness of slavery should be obvious. Write y(t)=2sin 4 pi t + 5 cos 4 pi t) in the form y(t) A sin (wt + ) and identify the amplitude, angular frequency, and the phase shift of the spring motion.Record your answers in the response box. I NEED HELP ASAPA green filter...Select one:a. transmits all other colors except green light. b. reflects only green light. c. absorbs only green light.d. transmits only green light. What happened as a result of the October (Yom Kippur) War in 1973? o Assume the role as the Public Relations Director for Purple Cross of North Carolina. The CEO requests that you interview the Telehealth Director about the use of Telehealth with Mrs. Smith. The CEO requests that you create one thought-provoking question for each of the following topic areas: Meeting the health needs of Mrs. Smith Decision-making process for technology selected for Mrs. Smith Benefits and risks in using Telehealth technology for Mrs. Smith Cost and staff involved in using Telehealth technology for Mrs. Smith Once glycogen stores are replenished, what role does the remaining oxidized glucose fill? Write the following in interval notationx < 8 Which president was pardoned ""for all offenses against the united states which he. . . has committed or may have committed""? The __________ principle states that growth follows a direction and pattern that begins with the head and upper body parts. (a) Draw a Velocity - Time graph for an Object with Constant Acceleration. (b) Draw a Velocity - Time graph for an Object with Constant velocity. (c) In the given graph, compare the acceleration the body undergoes in region A and C. To act as pic of a high-performance airplane, which training or experience would meet the additional requirements? Using stored liquidity to offset a deposit drain will reduce the size of the bank but using purchased liquidity to offset the drain will not. a. true b. false Mrs Marta is a financial executive with XYZ Enterprises. Although Mrs Msrts has not had any formal training in finance or accounting, she has a good sense for numbers and has helped the company grow from a very small company ($500,000 sales) to a large operation ($45 million in sales). With the business growing steadily, however, the company needs to make a number of difficult financial decisions in which Marta feels a little over his head. She therefore has decided to hire a new employee with numbers expertise to help her. As a basis for determining whom to employ, she has decided to ask each prospective employee to prepare answers to questions relating to the following situations she has encountered recently. Here are the questions. a. In 2009, XYZ Enterprises negotiated and closed a long-term lease contract for newly constructed truck terminals and freight storage facilities. The buildings were constructed on land owned by the company. On January 1, 2010, XYZ took possession of the leased property. 2 Why did Roosevelt feel the US needed to become a world power? 50 POINTS+BRAINLIEST 8TH GRADE MATH: A truck leaves a construction site with its cargo hold 1/4 full of sand. On the way, the truck stops at a depot, where 9 tons of sand is added to the cargo hold, making it 5/8 full. How many tons of sand could the cargo hold contain if completely full? 7of the trains are arriving late due to a train strike.Write down the ratio of on-time trains to late trains.15