1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
7

Which software can managers use to discuss financial performance with the help of slides and charts?

Computers and Technology
2 answers:
puteri [66]3 years ago
7 0

Managers can use <u>PowerPoint</u> software to discuss financial performance with the help of slides and charts.

Hope that helps :)

-Asmaa Ghazzawi

kvasek [131]3 years ago
7 0

Answer:

Presentation software

Explanation:

You might be interested in
Who are the founders of the video-sharing site Blip?
rewona [7]

the Founders would be Justin Day


3 0
4 years ago
Which of these benefits can be achieved whensoftware is restructured?
Ivenika [448]

Answer:

iv. all of the given options

Explanation:

This is the correct answer because this is what happens when software is restructured.

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

4 0
3 years ago
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
Explain the main privacy issues associated with use of IT in Walt Disney?
Studentka2010 [4]

Answer:

privacy policy describes the processing of information provided or collected on the sites and applications

6 0
3 years ago
A ________ is a temporary symbol or variable that you can replace subsequently with an element of your choice
dezoksy [38]
I believe the answer you are looking for is what's called an assignment statement. In computer programming, an assignment statement sets and/or resets the value stored in the storage location(s) denoted by a variable name; in other words, it copies a value into the variable. Also, in most imperative programming languages, the assignment statement or expression is a fundamental construct.
5 0
4 years ago
Other questions:
  • What is storage virtualization? Multiple Choice combines networks by splitting the available bandwidth into independent channels
    13·1 answer
  • 1) What is Net beans
    6·1 answer
  • What term is used to describe the time it takes a signal to travel from one location to another on a network?
    13·1 answer
  • Which of the following is not a protocal? <br><br>A) HTTP<br>B) FTP<br>C) WWW<br>D) HTTPS​
    15·2 answers
  • When using a search engine, what is the name of a word or phrase somebody types to find something online?
    12·2 answers
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • Which is better Play Station Xbox or PC
    14·2 answers
  • Hlo Brainlians !!
    11·2 answers
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!