1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
6

Renee uses data from the Bureau of Labor Statistics to create a graph for a feasibility report. Which of the following should sh

e provide below the graph in her report?
A. A source note for the data.
B. A note saying she made the graph herself.
C. An end-note for the data.
D. A Works Cited list.
Computers and Technology
2 answers:
Lena [83]3 years ago
5 0
. A source note for the data.
melamori03 [73]3 years ago
5 0
<span>A. A source note for the data. 
</span>
You might be interested in
A blue NFiPA label indicates: A) Health Hazard B) Special information C) Flammability D) Reactivity
elena55 [62]
Your answer would be A: Health Hazard
8 0
2 years ago
Read 2 more answers
Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
ICE Princess25 [194]

Answer:

Total Energy Input = Total Energy Output / Efficiency

Explanation:

The expression written above is not true about the energy conversion devices.The energy conversion devices convert energy from one form to another for of energy for example :- take a light bulb it converts electric energy to heat and light.There is no efficiency involved in the energy conversion devices.

6 0
2 years ago
You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
horrorfan [7]

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

5 0
3 years ago
g Which statement is true about the difference between combinational logic circuits and sequential logic circuits? A) Combinatio
kogti [31]

Answer:

D.

Explanation:  

In combinational circuits, the current output values are always the same for the same set of input values, regardless the previous values.

We say that combinational circuits have no memory, or that the circuit has no feedback from the outputs.  

For sequential circuits, on the contrary, the current output values are not based in the current input values only, but on the previous output values as well.

So, the fact of having a defined set of input values at a given moment, doesn't guarantee which the output values will be.

We say that sequential circuits have memory, or that they have feedback from the outputs.

Examples of these type of circuits are R-S, J-K, D or T flip-flops.

4 0
3 years ago
Martha is a network monitoring technician working on a firewall for her company’s network. To filter traffic going through the f
tia_tia [17]

Answer:

D

Explanation:

Not much of a tech person, but protocol then firewall seems the most reasonable.

7 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
    9·1 answer
  • List THREE different types of mouse:​
    9·2 answers
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    11·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • 2. Which of the following best describes the protocols used on the Internet?
    15·1 answer
  • Ex: If the input is: Pat Silly Doe the output is: Doe, P.S.
    9·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • PLEASE HELP ASAP!!! 99 POINTS FOR 3 MULTIPLE CHOICE QUESTIONS!!! PLEASE ANSWER ALL!!!
    8·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • Assume the size of an integer array is stored in $s0 and the address of the first element of the array in the memory is stored i
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!