1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
9

Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,

describe what software Carlos should use.
Computers and Technology
2 answers:
gladu [14]3 years ago
7 0
Excel Would be good for inventory and price management
vlada-n [284]3 years ago
3 0

Answer:

Carlos should use Microsoft word to keep track or Microsoft Excell to list prices and stock.

Explanation:

You might be interested in
What happens when you double-click one of the graphic options in the middle panel of the choose a smartart graphic dialog box?
pickupchik [31]
When you open MS Word, selecting the insert option and clicking SmartArt, will pop up SmartArt dialog box. Double-clicking on one of the graphic options in the middle panel will automatically select and place the graphic art you want. It is an easy way of inserting a SmartArt of your choice without selecting the art itself and clicking OK.





3 0
2 years ago
Read 2 more answers
What is a functional simulation?
Anika [276]
D) a type of training that allows...
4 0
3 years ago
Data with values that change continuously or smoothly over time is known as:
Alexeev081 [22]

Answer:

A.  \:  \boxed{analog  \: data}

5 0
3 years ago
Read 2 more answers
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
3 years ago
To delete data from a disk in such a way that no one can ever read it, you should ____.
Vlada [557]
Factory reset or install a new OS without keeping the data.
5 0
3 years ago
Other questions:
  • ​a(n) ____ is a communications device that connects a communications channel such as the internet to a device such as a computer
    11·1 answer
  • When we insert a new node into a red-black tree, we set the color of the newly inserted node n to red. observe that if we had ch
    15·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • What content is important to include in your webpage?
    9·1 answer
  • Classes cannot:
    10·1 answer
  • A videogame designer would be most interested in the _____ elements of beowulf.
    12·2 answers
  • What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
    15·1 answer
  • What does the CPU do in a computer?
    7·2 answers
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!