1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P

olicy?
A. Increase the Required Reserve Ratio
B. Decrease the Federal Funds Rate
C. Sell of government bonds
Computers and Technology
2 answers:
andreev551 [17]3 years ago
6 0
<span>C. Sell of government bonds</span>
Soloha48 [4]3 years ago
4 0
The answer is C i think that thats the answer
You might be interested in
Which of these is an application to control
N76 [4]

Not sure if your asking what certain application or the definition. But the definition: A security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk.

6 0
3 years ago
To connect several computers together, one generally needs to be running a(n) ____ operating system
Anastaziya [24]

Answer:

Local Area Network

Explanation:

In the Information technology it is called Local Area Network.

5 0
3 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
Variablesallow us to manipulate data through the ___________.
gladu [14]

Answer:

Reference

Explanation:

Variables provide reference to the stored data value.

For example:

int i = 0;

Here i is a variable of type int with an initial value of 0. i is a reference to this stored value 0. Now if I want to update the data, I can do so using this reference.

i = 1;

Now the reference is used to manipulate the stored data and change it to 1. In a similar manner all updates to the value can be done using the variable reference.

8 0
3 years ago
Effective controls protect ______ from workplace hazards.
erastovalidia [21]

Answer:

Contact your team leader, supervisor, manager, etc.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The default primary key for an access database is the id field true or falser
    7·1 answer
  • Add an array, which will store the most recent 5 recent transactions. For the array, add an insert function which will store the
    10·1 answer
  • Which statement is LEAST accurate? Select one: a. A common reason for ERP failure is that the ERP does not support one or more i
    14·1 answer
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    13·1 answer
  • No careers combine more than one value
    7·1 answer
  • Definition: This modern-day country was one of the most advanced ancient civilizations. Human
    8·1 answer
  • You have just purchased a new Dell PowerEdge R820 Rack Server. The server is equipped with four Xeon E5-4650 CPUs, 128 GB of RAM
    8·1 answer
  • Distinguish<br> between formal and Informal<br> Information System<br> Information systems
    13·1 answer
  • What symbol does access use to the left of a record when it is currently being edited and is therefore locked so that other user
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!