1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
13

What is profession explain with example​

Computers and Technology
2 answers:
nikdorinn [45]3 years ago
7 0

Answer:

the activities which are done for earning and to live life is called profession . eg: doctor ,engineer,

WARRIOR [948]3 years ago
4 0

Answer:   a profession is a job, or what you do for a living

example : a teacher is an example of proffesion

You might be interested in
What is the purpose of a mail merge field.
coldgirl [10]

adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

:)

3 0
3 years ago
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a
Sav [38]

Answer:

Permissions do not apply here.

Explanation:

The reason is that FAT partitions do not have files and folders permissions, only have sharing permissions. Therefore, once the file has been removed from the NTFS partition, the restrictions that once applied to it are now gone.

5 0
3 years ago
Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
Nadya [2.5K]

Answer:

hardware

Explanation:

4 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Write a program that prompts the user to input five decimal numbers. The program should then add the five decimal numbers, conve
juin [17]

Answer:

#include <iostream>

#include <cmath>

using namespace std;

int main()

{

   double num1, num2, num3, num4, num5, sum = 0;

   cout << "Input: ";

   cin >> num1 >> num2 >> num3 >> num4 >> num5;

   

   sum = num1 + num2 + num3 + num4 + num5;

   cout << "Output: " << static_cast<int>(round(sum)) << endl;

   return 0;

}

Explanation:

Include cmath to use the round function

Declare the variables

Get the five numbers from the user

Sum them and assign the result to the sum

Round the sum using the round function, and convert the sum to an integer using static_cast statement

Print the sum

6 0
4 years ago
Other questions:
  • The dashed lines that display on your slide when you are moving an object are
    10·1 answer
  • 2a
    8·1 answer
  • Write the definition of a method dashedLine, with one parameter, an int. If the parameter is negative or zero, the method does n
    8·1 answer
  • List four useful spreadsheet functions and explain what they do.
    11·1 answer
  • Given input of a number, display that number of spaces followed by an asterisk. (1 point) Write your solution within the existin
    15·1 answer
  • The derivative of <br><img src="https://tex.z-dn.net/?f=ln%20%5C%3A%20%20%7Cx%7C%20" id="TexFormula1" title="ln \: |x| " alt="l
    7·2 answers
  • What is the purpose of the Hide Slide feature in a presentation program?
    14·1 answer
  • PLEASEEE HELPPP im gonna cry
    11·2 answers
  • Why is this app here to help but wont let me see answers to my questions?
    14·2 answers
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!