1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
6

Which member of the restaurant and food/beverage service career is mostly likely to plan menus and direct worker

Computers and Technology
2 answers:
kumpel [21]3 years ago
5 0

What are the options for the question

Vera_Pavlovna [14]3 years ago
3 0

I think that it is a manager or if a small business it would be the owner

You might be interested in
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish
laila [671]

Answer:

The correct option is A

Explanation:

In project management, earliest finish time for activity A refers to the earliest start time for succeeding activities such as B and C to start.

Assume that activities A and B comes before C, the earliest finish time for C can be arrived at by computing the earliest start-finish (critical path) of the activity with the largest EF.

That is, if two activities (A and B) come before activity C, one can estimate how long it's going to take to complete activity C if ones knows how long activity B will take (being the activity with the largest earliest finish time).

Cheers!

7 0
3 years ago
What are the advantages and disadvantages of UTF-8 compared to ASCII?
Romashka [77]

Answer:

UTF-8 and ASCII both are the character encoding.

In a system,every character has some binary representation,these are the method to encode them.Earlier only ASCII was there, for every character it uses 8 bits to represent.In ASCII only 8 bytes were there i.e 2^8 that is 256.We can't represent number beyond than 127 so it generate a need for other encoding to get into,these drawbacks lead to Unicode,UTF-8.

As ASCII codes only uses a single byte,UTF-8 uses upto 6 bytes to represent the characters.So we can save characters which are as long as 2^48 characters. We can read this encoding easily by the help of shift operators and it is also independent of byte order.

As messages on internet were transferred over 7 bit ASCII messages,so many mail servers removed this encoding.    

6 0
3 years ago
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidentia
SOVA2 [1]

The employee would access an intranet to maintain security.

6 0
3 years ago
What will be the value of bonus after the following code is executed?
pashok25 [27]

Answer:

Option (B) i.e., 500 is the correct option to the following question.

Explanation:

The following option is correct because here, firstly they defined two integer data type variable i.e., "bonus" and "sales" and assign value to the variable "sales" i.e., 6000 then, the set the if-else if statements to check the "bonus" and pass conditions is if the sales is less than 5000 then bonus is equal to 200 otherwise if the sales is less the 7500 then bonus is equal to 500 otherwise if the sales is less the 10000 then bonus is equal to 750 otherwise if the sales is less the 2000 then bonus is equal to 1000 otherwise bonus is equal to 1250.

So, according to the following conditions sales is less than 7500 because sales is equal to the 6000 that's why the following option is correct.

6 0
3 years ago
Other questions:
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • The part of the computer that contains the brain or central processing unit is also know as the
    15·2 answers
  • Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activat
    5·1 answer
  • Please help. 15 points!!!!
    8·2 answers
  • A ___________ allows Internet telephony service providers to deliver telephony services and unified communications applications
    6·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • Write a function named "isValidPassword" that takes in a string and returns 1 if it stores a valid password and 0 otherwise, A v
    12·1 answer
  • 15
    9·2 answers
  • Directions: Arrange the jumbled letters to make/form a new word. Then give a
    12·1 answer
  • java Two smallest numbers Write a program that reads a list of integers, and outputs the two smallest integers in the list, in a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!