1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
13

The purpose of a business report is to _____.

Computers and Technology
2 answers:
mars1129 [50]3 years ago
4 0
Im pretty sure the answer is 2.
Sveta_85 [38]3 years ago
3 0

Answer:

communicate financial data, statistical data, and experimental data

Explanation:

You might be interested in
6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' b
Nina [5.8K]

Answer:

trees_to_cut = int(input("How many trees do you wants to cut? "))

print(str(trees_to_cut) + " tree(s) will be cut.")

for i in range(trees_to_cut):

   print("Tree #" + str(i))

   

   rings = int(input("How many rings in tree " + str(i) + "? "))

   print("There are " + str(rings) + " ring(s) in this tree.")

   for j in range(rings):

       print("Celebrating tree #" + str(i) + "'s " + str(j+1) + ". birthday.")

Explanation:

*The code is in Python.

Ask the user to enter the number of trees to cut

Print this number

Create a for loop that iterates for each tree

Inside the loop:

Print the tree number. Ask the user to enter the number of rings. Print the number of rings. Create another for loop that iterates for each ring. Inside the inner loop, print the celebrating message for each birthday of the tree

7 0
4 years ago
ERP implementation probably will not require:
Mamont248 [21]

Answer:

c. just a few weeks to install.

Explanation:

ERP is known as Enterprise Resource Planning.ERP implementation involves software installation, transfer of the financial data to the new system, configuration of the users and processes and training the users on the software.

It also involves upgrades after installation,cross-functional teams, intensive training, high funding for both initial cost and maintenance. This whole process usually takes place between 6 months to 2 years. This makes option C which says it takes few weeks to install incorrect.

3 0
3 years ago
Read 2 more answers
The physical parts or components of a computer system is called
liq [111]
The ConputergefvkdevkdegkedgkgxkgwxkzgkfzsjsfzjzsdjszfjwzfhwfwHkdKGWsqkgddaqhkdqakgQdgkQGgqzdgzkqdhqkfzqkhqczljaxhlcwzhlzchaxlhwxgkwdgkwdwkzgzmgzgkwdgmwzdgzwkdamxadmhfzahm
8 0
3 years ago
Read 2 more answers
The UIDs for a set of hierarchical entities can be propagated through multiple ________ relationship
SOVA2 [1]

The unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship.

<h3>What is a UID?</h3>

UID is anacronym for unique identifier and it can be defined as an alphanumeric or numeric string that is associated with a single entity or unique among all identifiers within an information system (IS).

This ultimately implies that, unique identifier (UIDs) are identifiers that marks a particular record within an information system (IS) as unique from every other record.

In Computer science, the unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship because they represent the relationships between the originating entities and the intersection entity.

Read more on a unique identifier here: brainly.com/question/25619349

5 0
3 years ago
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
Other questions:
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • Powerpoint increased the weight of a line in ____ increments.
    13·1 answer
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • What is a different paragph formatting tools
    6·1 answer
  • Time complexity: Be sure to show your work. Suppose that a particular algorithm has time complexity T (n) = 10 ∗ 2n, and that ex
    7·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression
    11·1 answer
  • Which web browser was created by Google?
    5·2 answers
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
  • Write a function to take three integers x, y and n and check if x and y are both fall between 0 to n-1. If yes, your function sh
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!