1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
4 years ago
13

List 3 items that were on kens resume that should have been excluded

Computers and Technology
2 answers:
ddd [48]4 years ago
5 0

Making it into a brochure, his favorite movies, and eating with chopsticks.

NemiM [27]4 years ago
3 0

Answer:

"Eating with chopsticks"

"Top 10 favourite movies"

"Predicated global warming"

Explanation:

This question refers to the movie "Bee Movie." These are three items on Ken's resume that should have been excluded. These items do not give us a professional understanding of Ken. Moreover, these skills might be slightly interesting, but they have no relevance in the workplace. Because of this, it is unnecessary, and even damaging, for Ken to focus on them.

You might be interested in
3423509 join the kahoot its for fun its about the holidayss:)
zheka24 [161]

Answer:

:)

Explanation:

7 0
3 years ago
You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not r
Alecsey [184]

Answer:

C. A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation.

Explanation:

3 0
3 years ago
What are the different type of computer files?
oee [108]

Answer:

There actually a lot of them: World, PPT, Excell

Explanation:

6 0
3 years ago
Read 2 more answers
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
(tco 8) when asp.net receives a request for an application that uses forms-based authentication from a user who hasn't been auth
leonid [27]
Hi,

This what you are looking for: "records incorrect prompt"

Hope this helps.
r3t40
7 0
3 years ago
Other questions:
  • MATLAB graphics user interface:<br> Describe what Folder, Command Window and Workspace are.
    5·1 answer
  • What is the part of the computer system that receives inputs, directs those inputs to the processor, and redirects the processed
    14·1 answer
  • Use semaphore(s) to solve the following problem. There are three processes: P1, P2, and P3. Each process Pi has a segment of cod
    11·1 answer
  • . How does Word indicate a possible instances of inconsistent formatting?: *
    13·1 answer
  • More recent GPU families such as Fermi and Kepler have adopted CPU-style virtual memory architecture with a____________-bit virt
    8·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • I need names for an anime and powers so plz make then unique
    14·1 answer
  • What happens when i expose a disk to magnetic fields?​
    5·1 answer
  • A ___________ is a variable used to pass information to a method.
    11·2 answers
  • 18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!