1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
8

Never mind I got it

Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
5 0
<span>She is estimating the future profits with an estimate of long-term sales and the actual cost incurred.</span>
HACTEHA [7]3 years ago
3 0

Answer:

she is estimating the future profits with an estimate of long term sales and actual cost incurred.

Explanation:

The What-if analysis function is used to compare the relative effect of different activities on each other like with the statement : she is estimating the future profits with an estimate of long term sales and actual cost incurred. in this statement the future profits of the company is dependent on the sales and actual cost incurred by the company and it is been compared to the effect of long term sales on it and also the effect of cost incurred by the company on it as well .

hence this sentence ( she is estimating the future profits with an estimate of long term sales and actual cost incurred ) is a very perfect example of the What-if analysis function.

You might be interested in
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
Under which key category do the Page Up and Page Down keys fall?
Fiesta28 [93]
They are called the navigation keys
7 0
4 years ago
Read 2 more answers
Write the pseudocode for this flowchart
MrMuchimi

Answer:

Explanation:

class TimeToSleep() {

  main bunch of stuff (string argos) {

       int age;

       string comedy;

       bool guess;

        public bool imTheMasterMethod() {

           guess = true;

           while (guess) {

              comedy = "You forgot to put the flowchart, you meathead!";

              println(comedy);

               

                scan("%d", &age);

                if (age < 18) {

                    println("Go to sleep kiddo!");

                }

           }

        }

   }

}

       

6 0
3 years ago
The following function takes an array of n integers as its input and returns 1 if the array is sorted in non-decreasing order, 0
SIZIF [17.4K]

Answer:

Following is given the detailed solution to each part o question. I hope it will help you a lot!

Explanation:

5 0
3 years ago
4.2.3: Basic while loop expression. Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Fol
wlad13 [49]

Answer:

import java.io.*;

import java.util.Scanner;

class divide {

public static void main (String[] args) {

    Scanner num=new Scanner(System.in);//scanner object.

    int userNum=num.nextInt();

    while(userNum>1)//while loop.

    {

        userNum/=2;//dividing the userNum.

        System.out.print(userNum+" ");//printing the userNum.

    }

}

}

Input:-

40

Output:-

20 10 5 2 1

Input:-

2

Output:-

1

Input:-

0

Output:-

No Output

Input:-

-1

Output:-

No Output.

Explanation:

In the program While loop is used.In the while loop it divides the userNum by 2 in each iteration and prints the value of userNum.The inputs and corresponding outputs are written in the answer.

4 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • How do I learn coding??? ​
    5·2 answers
  • What are the prime factorizations of 52 and 77? a. b.
    5·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • What is Human Dignity
    12·1 answer
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
    10·1 answer
  • If we want to access files located in a directory on a remote server, which of these options would we use?
    9·2 answers
  • What feature should be used before a document is printed
    8·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!