1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
8

Which of the following branches of government is NOT involved in Discretionary Fiscal Policy?

Computers and Technology
1 answer:
Ket [755]3 years ago
6 0
Federal perserve hope this helps :)

You might be interested in
Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
Fynjy0 [20]

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

3 0
3 years ago
How does the technology work
Ivan

Answer:  it does – or perhaps appears to do – in the world.

Explanation:

sorry if am not right have a nice day lol

6 0
3 years ago
Read 2 more answers
Match the item to the type.​
Roman55 [17]
The chart with the circle in the top right is a pie chart

the top left chart on enrollment is a histogram

the bottom chart is a bar chart
3 0
2 years ago
How to recover permanently deleted files from drive
HACTEHA [7]
Go into your trash bin in your computer.
7 0
3 years ago
The correct or acceptable way of communicating on the internet is known as
stepladder [879]
I want to say e-mail.

8 0
3 years ago
Other questions:
  • Consider the following recursive method, which is intended to return a String with any consecutive duplicate characters removed.
    11·1 answer
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
    8·1 answer
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • An email can lead to miscommunication because:
    6·2 answers
  • Question 4 / 5
    11·1 answer
  • 2. From the listing code, please give the block of line numbers for code which are concerned with the following: A) Main functio
    5·1 answer
  • Which of the following is NOT true about procedural abstraction?
    9·1 answer
  • Please please help I don’t understand
    6·1 answer
  • Upload your completed project including the following:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!