1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
8

Never mind I got it

Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
5 0
<span>She is estimating the future profits with an estimate of long-term sales and the actual cost incurred.</span>
HACTEHA [7]3 years ago
3 0

Answer:

she is estimating the future profits with an estimate of long term sales and actual cost incurred.

Explanation:

The What-if analysis function is used to compare the relative effect of different activities on each other like with the statement : she is estimating the future profits with an estimate of long term sales and actual cost incurred. in this statement the future profits of the company is dependent on the sales and actual cost incurred by the company and it is been compared to the effect of long term sales on it and also the effect of cost incurred by the company on it as well .

hence this sentence ( she is estimating the future profits with an estimate of long term sales and actual cost incurred ) is a very perfect example of the What-if analysis function.

You might be interested in
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
3 years ago
Computers that are close to one another are connected to form a LAN
Archy [21]

Explanation:

different computer are connected to a LAN by a cable and an interface card

6 0
3 years ago
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
Select the correct answer.
zmey [24]

the answer should be the letter a

3 0
3 years ago
Read 2 more answers
True or false? the categories of software applications are mutually exclusive
Natali [406]
False, the categories of software applications are not mutually exclusive.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • George and Miguel want to know more about their local and online competitors and about the retail industry. What is the best way
    9·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Suppose you have four 500 MB hard drives plus one 2 GB flash drive. How many GB of capacity is this overall?
    12·1 answer
  • The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
    5·1 answer
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • Simplify 0.2×0.03055 to 3 decimal places​
    15·2 answers
  • Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out th
    9·1 answer
  • Add code to this loop, to pick up all of the radios, with only seven blocks.
    13·1 answer
  • You are starting a small web hosting business and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!