1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
4 years ago
5

Which of the following can indicate what careers will be enjoyable ?

Computers and Technology
1 answer:
pishuonlain [190]4 years ago
5 0

Answer: c. Interests

Explanation:

A person's interests are things that they love to do because they find those things to be enjoyable for example, gaming, writing or travelling.

To find out what careers a person would find enjoyable therefore, the interests can be looked at because if the person enjoy doing those things without it even being a job then they would probably enjoy those things in a career setting as well. For instance a person who enjoys writing would probably find a career in jornalism to be enjoyable.

You might be interested in
Computers are not automatic they need human to operate.(true or false)​
Soloha48 [4]

Answer:

both

Explanation:

most computers need a human to operate but there are ai can run without human intervention

7 0
3 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
Which domain indicates that a website is sponsored by a university or college?
d1i1m1o1n [39]

There are two domains that are commonly associated with sites that owned by a university or college: .edu and .ac.

In the case of .edu, <u>it is only available for United States higher education institutions or higher education institutions outside U.S that are affiliated with the United States since 2001.</u>

For non-U.S colleges and universities, they will commonly <u>use .ac as a second-level domain before putting in their country domain as the top-level domain.</u> Examples of this would be .ac.uk and .ac.jp.  


8 0
3 years ago
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into y
ANTONII [103]

Answer:

.c. Load them via your login script.

Explanation:

Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.

Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.

Therefore, in this case, what you can do is to "Load them via your login script."

4 0
3 years ago
Insert Into invoices (vendor_id, invoice_number, invoice_total, payment_total, credit_total, terms_id, invoice_date, invoice_due
FinnZ [79.3K]

Answer:

There are few values in the list. So, this insert statement will not be executed.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following best describes open source software?
    7·2 answers
  • Video- sharing sites allow videos to be uploaded in which file format?
    5·2 answers
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • Word processing software allows users to do which of the following:
    10·1 answer
  • What is the maximum duration of daily scrum meetings A:15minsB:45minsC10mins:30mins
    7·2 answers
  • Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display
    5·1 answer
  • All banks follow the same guideline for determining if an applicant qualifies for a loan.
    13·1 answer
  • Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
    10·2 answers
  • “If the information ______________________, then that information (should / should not) be stored because _____________. For exa
    10·1 answer
  • Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!