1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
5

What is not a common purpose for a research report?

Computers and Technology
2 answers:
Tasya [4]3 years ago
5 0

Answer: to entertain

Explanation:

irina [24]3 years ago
4 0
I’m pretty sure it’s to entertain
You might be interested in
Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
Oksi-84 [34.3K]

Answer:

Moderate investor

Explanation:

The moderate investors are most popularly known as 'Balanced investors'. They accepts the risk to principal and they adopt the balanced approach. They mainly uses a mixture of bonds and stocks.

They values the reducing risks and then enhancing the returns equally. They accepts modest risks so as to ensure higher long term returns.

6 0
2 years ago
Which group of commands all appear on the Standard toolbar?
topjm [15]
I hope this helps

print 
copy 
past 
send 

7 0
3 years ago
I need names for an anime and powers so plz make then unique
Olegator [25]
Make your own name for your anime and your own powers it’s really not that hard bud
5 0
3 years ago
The icons to insert pictures and clip art in the PowerPoint application are located in the _____ grouping on the Insert tab.
saul85 [17]
The icons to insert pictures and clip art are located in the images grouping on the insert tab.
3 0
3 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
Other questions:
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • nswer the following questions concerning chapter 1:1.1 Which pair of layers are NOT peer layers?a.Transport layer in the sender
    9·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • Database accessibility DBA writes subschema to decide the accessibility of database.
    13·2 answers
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
  • How to create drop down list in excel with multiple selections.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!