1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
4 years ago
12

Which one of these is NOT a successful budgeting strategy?

Computers and Technology
2 answers:
Elina [12.6K]4 years ago
7 0
Answer D isn't a successful budgeting strategy.
Jet001 [13]4 years ago
6 0
I think it's hope it helps
You might be interested in
"A ____ is loosely defined as a very small device that has some built-in computing or Internet capability"
gizmo_the_mogwai [7]

Answer:

A mobile device is loosely defined as a very small device that has some built-in computing or Internet capability.

Explanation:

A mobile device also referred to as a handheld device is a computer device small enough to hold and operate in the hand.

Mobile devices can connect to the Internet and interconnect with other devices such as headsets through Wi-Fi, Bluetooth, cellular networks or near field communication (NFC).

Examples are: Smartphones, Tablets, Calculator , Digital media player , Handheld game console , Laptop , Mobile Internet Device (MID) , Personal Digital Assistant (PDA) , and Pocket calculator .

7 0
3 years ago
A student wants to count the number of shows that meet both of the following criteria.
o-na [289]

Answer:

ii. (genre = "talk") AND ((day = "Saturday") OR (day = "Sunday"))

Explanation:

it feels like the right answer to choose, i may not be an expert but this is what i feel like the answer is.

5 0
3 years ago
The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
vitfil [10]
Net neutrality buddy boi
3 0
3 years ago
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
Modern database tools support ________________, which entails separating data from the programs that manipulate data.
Bas_tet [7]
The correct answer: Data independence

Data independence<span> is the type of </span>data<span> transparency that matters for a centralised DBMS. It refers to the immunity of user applications to changes made in the definition and organization of </span>data<span>. Physical </span>data independence<span> deals with hiding the details of the storage structure from user applications.
</span>
The logical<span> structure of the data is known as the 'schema definition'. In general, if a user application operates on a subset of the </span>attributes<span> of a </span>relation<span>, it should not be affected later when new attributes are added to the same relation. Logical data independence indicates that the conceptual schema can be changed without affecting the existing schemas.
</span>
<span>The physical structure of the data is referred to as "physical data description". Physical data independence deals with hiding the details of the storage structure from user applications. The application should not be involved with these issues since, conceptually, there is no difference in the operations carried out against the data.</span>
8 0
4 years ago
Other questions:
  • What advantage does a reliable web page have over published textbooks and encyclopedias?
    15·2 answers
  • What is the definition of legal intrusion
    14·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • You can use any of the ____ comparison operators to control a loop.
    9·1 answer
  • Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.
    12·1 answer
  • A _ fire extinguisher should be used on a computer fire
    15·1 answer
  • You need to secure your wireless network. which security protocol would be the best choice
    10·1 answer
  • What is the use of comma and semicolon with print statement ?​
    11·1 answer
  • Write a function header for the ZooAnimal class member function daysSinceLastWeighed. This function has a single integer paramet
    10·1 answer
  • Javascript and java are really just two slightly different names for the same language.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!