1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
7

What should a career plan include?

Computers and Technology
1 answer:
stealth61 [152]3 years ago
4 0
A career plan is a practical strategy that allows you to determine your skills and interests, set career goal, and put actions in place that will help you reach them.It's a continuous process, and it includes an overview of, your current skills and experience.
Hope this helps :)
You might be interested in
How has the Internet changed the design industry?
Alexandra [31]
<span>Loads of ‘easy to use’ programmes and ‘How To’ guides make it simple for anyone to put a brochure/newsletter/marketing piece together – how difficult can it be with so much help available? Technology has not only changed the way designs are accomplished, it’s changed the perception of ‘design’ from a hard earned skill to something you can learn in an afternoon off.

via </span>https://dmjcomputerservices.com/blog/technology-changed-design-industry/

4 0
3 years ago
in python, using the simplest form the print_seconds function so that it prints the total amount of seconds given the hours, min
PolarNik [594]

Answer:

I'm guessing you want a function so...

def print_seconds(hours, minutes, seconds):

seconds += 3600 * hours + 60 * minutes

print(seconds)

return 0

Hope this helps. :)

4 0
2 years ago
Why can't we sign up to brainly.com??????????????????
LiRa [457]

Answer:

Explanation:

so why are you doing sign up

8 0
3 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
What is your favorite coler and what do you like to do and
KIM [24]

Answer:

Orange

Explanation:

I like orange because its vibrant.

7 0
3 years ago
Other questions:
  • What is the formula equivalent to the function =SUM(B1:B5)? A. =B1+B5 B. =$B$1+$B$5 C. =B1+B2+B3+B4+B5 D. =$B$1+$B$2+$B$3+$B$4+$
    7·1 answer
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • Which of the following is a term used for the permanent record of activities performed on the Internet?
    11·1 answer
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • You can use a(n) to call a function in response to an event?
    14·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    14·2 answers
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • Information systems include all of these
    5·1 answer
  • Who can add entries to value log
    8·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!