1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
10

A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo

u give her?
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
4 0
Even though she might not buy anything expensive doesn't mean she doesn't  buy a lot of things. Sometimes you buy things that aren't expensive but as you buy and buy and buy, you end up with little money.
You might be interested in
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
What should an administrator use to more easily assign database access permissions to multiple users?
Kruka [31]

Answer:

to allow administrators to assign rights and permissions to multiple users

Explanation:

8 0
3 years ago
Hello brainly users can someone help me out with this question thanks!!!
slavikrds [6]

Answer:

a medical journal/study from a licenced doctor on a website with .org

Explanation:

most medical journals from licenced doctors have .org in the end and are trusted

6 0
3 years ago
Read 2 more answers
science and technology are interdependent advances in one lead to advances in the other. give an example of this phenomenon.
goblinko [34]
Wouldn't it Be Stem ? 
Science 
technology
Engineering 
Mathmatics 
5 0
4 years ago
. When would one use the analytic application fraud detection?
vaieri [72.5K]

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

4 0
3 years ago
Other questions:
  • Do anti viruses install themselves on other computers in the network
    6·1 answer
  • User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not
    12·1 answer
  • What is blogging
    15·2 answers
  • Default tab stops are set in Word every _______ inch. <br> A. ½<br> B. 1<br> C. ¼<br> D. ¾
    6·1 answer
  • AI in processing capability of computer yes or no​
    13·2 answers
  • Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
    8·1 answer
  • A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be abl
    12·1 answer
  • Which statement best describes 'abstraction'? *
    5·1 answer
  • Best definition of wind
    7·1 answer
  • What (if any) are the same feature requirements that might be found in server software/OS environments
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!