1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
5

Anna is looking for a job. Which two types of skills would she find necessary to secure a job ?

Computers and Technology
1 answer:
Leokris [45]3 years ago
7 0

C . Technical and frequent

i think this is the make sense the most


You might be interested in
What technique is used when setup times at a workstation are sequence dependent?
grigory [225]

Answer:

johnsons rule minimizes total idle time for both machines or work centers. What technique is used when setup times at a workstation are sequence dependent? determine the total time of each job sequence permutation considering the setup time and choose the best (lowest) time.

Explanation:

please mark me as brainliest thank you

3 0
3 years ago
Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
bonufazy [111]

The principles of creating equations are the same in PowerPoint 2007 and later. Assuming Danny is using PowerPoint 2010, he will click on the insert tab then go ahead and choose the Equation in the symbols group. 

Dani will be able to click on the equation option and use the Equation Tools Design tab or click on the drop down arrow to view more equations






3 0
3 years ago
The natural functions of Earth seem all _____ in one way or another.
Sonja [21]
Would it be Similar ?
4 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
Write a loop that fills an array int values[10] with ten random numbers between 1 and 100. Write code for two nested loops that
zalisa [80]

Answer:

#include <iostream>

#include <cstdlib>

using namespace std;

int main() {

   int[] array = new int[10];

   int index = 0;

   while(index < array.size()){

           int number = (rand() % 100) + 1;

           for (int i = 0; i < 1; i++) {

               array[index] = number;

               cout<< "Position "<< index << "of the array = "<< number << endl;

               ++index;

           }

     }

}

Explanation:

The while loop in the source code loops over a set of code ten times, The for loop only loops once to add the generated random number between 1 and 100 to the array of size 10. At the end of the for loop, the index location and the item of the array is printed out on the screen. The random number is generated from the 'rand()' function of the C++ standard library.

7 0
2 years ago
Other questions:
  • The spreadsheet below shows the names years in office, and number of terms for five US presidents
    7·2 answers
  • In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.
    8·2 answers
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • Please help
    14·1 answer
  • What is the formula equivalent to the function =SUM(B1:B5)? A. =B1+B5 B. =$B$1+$B$5 C. =B1+B2+B3+B4+B5 D. =$B$1+$B$2+$B$3+$B$4+$
    7·1 answer
  • A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location
    13·1 answer
  • WHICH COMPUTER COMPONENT CONTAINS ALL THE CIRCUITRY NECESSARY FOR THE OTHER COMPONENTS OR DEVICES TO COMMUNICATE WITH ONE ANOTHE
    12·1 answer
  • NO LINKS Please
    8·2 answers
  • Capstone Project part 11 quiz
    6·1 answer
  • A software giant is enabling a city with smart parking, using real-time information captured by sensors on the vehicle and senso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!