1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
8

That is Entrepreneur ? ?​

Computers and Technology
1 answer:
AlladinOne [14]3 years ago
5 0

Answer:

An entrepreneur is an individual who creates a new business or, an organization. An entrepreneur combines these to manufacture goods or provide services and provides leadership and management for the business. That is entreprenuer.

Hope this helps...!

Explanation:

You might be interested in
The processes of only seeing only some records frome data table is called as what​
Aliun [14]

Explanation:

For other uses, see Table. An example table rendered in a web browser using HTML. A table is an arrangement of data in rows and columns, or possibly in a more ... The first row is not . is called Html

5 0
3 years ago
_____________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey underst
Lyrx [107]

Answer:Knowledge

Explanation: Knowledge is the collections of the facts , figure and related data in order to make context regarding any topic. The context of knowledge is organized and formatted in such a manner which can be understood and learnt by the individuals.It is based on the theory or any practical incident to describe the information about it.

E.g.- the remembering of any particular historic incident.

4 0
4 years ago
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Companies use various output ____ methods to maintain output integrity and security.
Len [333]
<span>Companies use various output control methods to maintain output integrity and security.</span>
8 0
3 years ago
Which activity is a case of identity theft?
vagabundo [1.1K]

Answer:

C, stealing someone else's personal data.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a disadvantage of using solar energy? A.It reduces greenhouse gas emissions. B.It requires a high init
    12·2 answers
  • List five characteristics of a series circuit
    9·1 answer
  • T-shaped, square-bottomed, dovetailed, and V-shaped are all types of _______ in a machined part. A. gears B. bolts C. lines D. s
    8·2 answers
  • ________ tv uses a digital signal, or series of 0s and 1s, and is much clearer and less prone to interference than analog tv. re
    9·1 answer
  • 2 What Java keyword is used to create a subclass? interface. extends. implements. inherits.
    9·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • You must obey any special signs or instructions as you pass a construction zone.
    14·2 answers
  • If you download a virus onto ur computer which is the best way to get rid of it
    9·2 answers
  • I need trash talk for a comeback:
    11·2 answers
  • Define the following:-<br><br>1) cryptography<br><br>2) Quantum Cryptography​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!