1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
2 years ago
7

Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P

olicy?
A. Increase the Required Reserve Ratio
B. Decrease the Federal Funds Rate
C. Sell of government bonds
Computers and Technology
2 answers:
andreev551 [17]2 years ago
6 0
<span>C. Sell of government bonds</span>
Soloha48 [4]2 years ago
4 0
The answer is C i think that thats the answer
You might be interested in
Four-pair UTP uses ________ connectors a)snap b)ST or SC c)None of these
Oliga [24]

Explanation & answer:

Four pair UTP (unshielded twisted pair) cables are common cables with RJ45 connectors.  Most RJ45 connectors have a snap to lock the male connector in place.

ST and SC connectors are for fibre-optics.

4 0
3 years ago
____________________ material is information, graphics, images, or any other physical or electronic item that could have value a
djverab [1.8K]

Answer:

Explanation:

Evidentiary material is information, graphics, images, or any other physical or electronic item that could have value as evidence in a legal proceeding, whether criminal or civil. Information of evidentiary value may be found on digital  media such as CDs,  (DVDs), floppy disks, thumb  drives, hard drives, and memory expansion cards found in digital cameras and mobile  phones.

7 0
3 years ago
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
For the block of 400 addresses, what is the length of the net id? njit
rewona [7]
23 bits would leave room for 512 node numbers.
3 0
2 years ago
Which is a key component to participating in a school-to-work program?
Solnce55 [7]

The key component to participating in a school-to-work program is known as Job shadows.

<h3>What are job shadows?</h3>

Job shadowing is known to be a kind of on-the-job training that gives room for an interested employee to follow closely an see or analyze another employee carrying out the work.

Therefore, one can say that the key component to participating in a school-to-work program is known as Job shadows.

Learn more about School from

brainly.com/question/2474525

#SPJ1

4 0
2 years ago
Other questions:
  • In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
    9·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    12·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces s
    7·2 answers
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • Has anyone on here heard from lilkoadkmillines?
    10·1 answer
  • Why might a business choose a server-based network over a peer-to-peer network?
    15·1 answer
  • He should identify his various
    6·1 answer
  • Information Technology (IT) is a component of an Information System (IS)<br><br> True or False
    9·1 answer
  • If you need assistance or have questions related to your sevis record, i-20, admission, or course registration which phone numbe
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!