1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
8

Which of the following branches of government is NOT involved in Discretionary Fiscal Policy?

Computers and Technology
1 answer:
Ket [755]3 years ago
6 0
Federal perserve hope this helps :)

You might be interested in
Sending obscene material over the internet cannot be successfully prosecuted because of what
babunello [35]
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
5 0
3 years ago
How to set up a simple peer-to-peer network using a star topology?
kkurt [141]

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

  • Each common network setups network unit, such as a firewall, switch, as well as computer.
  • The main network computer serves as either a server as well as the peripheral system serves as just a client.
7 0
3 years ago
To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso
Sladkaya [172]

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

7 0
3 years ago
You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows so
creativ13 [48]

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

5 0
3 years ago
A team member was assigned 4 stories during sprint planning for a 2 week Sprint. Story 1 is easy to complete but does not add a
lbvjy [14]

Answer:

Option (B) is correct answer.

Explanation:

In this whole world, any person needs to do the task because of some profits. If there is a task with more points and if it is easy then it needs to be executed first.

Here in this question, story 2 is an easy task and gives more money, so that is to be executed first. Story 4 also gives more money but it is not easy so no one grantee to complete the task.

Hence option b is the correct answer. while the other option is not because--

  • Option "a" states about story 1, which is easy to complete but can not provide any type of value or money. So why anyone complete that task first which does not gives any types of profits.
  • Option c states about story 3, which is not easy to complete and also does not give any profits. So do not need to complete that task first which does not provide any profits and also that is difficult.
  • Option d states about story 4, which is not easy to complete but gives a lot of points. But there is no grantee that the task can complete in time. so no one needs to complete the risky task in the first order.

Hence the team member needs to execute the task in the following order--

  1. Story 2
  2. Story 4
  3. Story 1 and then
  4. Story 3

4 0
3 years ago
Other questions:
  • Network and web0based software used for workplace collaboration is commonly called?
    11·1 answer
  • Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
    10·1 answer
  • What’s good and bad about having social media?
    14·2 answers
  • Write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print
    12·1 answer
  • The ____ method writes a newline character after the data.
    11·1 answer
  • Write a function strlen_recursive which accepts a pointer to a string and recursively counts the number of characters in the pro
    6·1 answer
  • Can i add ADSence on bangla content in blogsopt website?
    12·1 answer
  • Which of the following is NOT an acceptable way to create a color?
    14·1 answer
  • Select the correct answer from each drop down menu
    8·2 answers
  • What is the full form of HTML?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!