1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
4 years ago
6

Iisa is creating a resume in which section should she mention her career goals

Computers and Technology
1 answer:
spayn [35]4 years ago
8 0
Objective (sometimes called objective selection)
You might be interested in
Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas
krek1111 [17]

Answer:

name1+","+name2+","+name3

Explanation:

Given

name1, name2 and name3

Required

Concatenate, separated by comma (,)

To concatenate, we simply use the + operator.

So, the expression is:

name1+","+name2+","+name3

3 0
3 years ago
1. Assuming you are downloading a 100MB (800Mb) file on a Network that can download data at 54Mbps.
Taya2010 [7]

Answer:A.)Say you have a 1 Mbps Internet connection. With such a connection speed, you might expect to download files at a rate of around 1 MB per second, but when you actually download a file, the download speed only reaches up to 100 – 120 KB per second.

B.)File Size In Megabytes / (Download Speed In Megabits / 8) = Time In Seconds. A 15 Megabyte file, downloading at 10 Megabits per second: 15 / (10/8) = 12 seconds.

C.) If the file size is 100mb and downloading speed is 54Mbps So the total time taken is 00:00:15.

Explanation:

7 0
3 years ago
Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
Katyanochek1 [597]

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

5 0
3 years ago
Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has
Ronch [10]
Her Drafts folder. Hope this helped!
3 0
3 years ago
Read 2 more answers
Mi amiga es una chica y es soltera y quiere novia, a cualquiera le interesa?
Kazeer [188]

Answer:

me does she speak engilsh

Explanation:

3 0
3 years ago
Other questions:
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • If you are feeling sick and you want to drive somewhere, you should
    12·2 answers
  • Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should h
    15·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
    14·1 answer
  • Can Anybody Answer This
    8·1 answer
  • What is technology??
    12·1 answer
  • Technology, by itself is neither good nor bad.<br> A) true<br> B) false
    11·2 answers
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • What feature is required to track customer search terms on a website?
    9·1 answer
  • What is the purpose of a computer network needs assessment? to evaluate how to move from the current status to the desired goal
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!