1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
3 years ago
12

You are applying for a secretary position. You have many skills but which of the following would not be one to include on the ap

plication? A.how many marathons you have run B.knowledge of word processor and spreadsheets C. How many words a minute you can type D. Previous experience with phone sales
Computers and Technology
2 answers:
nalin [4]3 years ago
7 0

How many marathons you have run

zepelin [54]3 years ago
6 0

A. How many marathons you have run, because it doesn't relate to the job you're applying for.

You might be interested in
3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
MrRissso [65]

Answer:

Pre-processors look at organize traffic and screens parcel transmissions by examining andreassembling divided data.Frag2:preprocessor that battles against IP fracture attacks.Attackers sends a fragmentedTCP bundle with header data that gets entrance through a firewall.At the equivalent time,other parcels with vindictive information "slip" by the firewall undetected because of the fragmentationbeing so little by overwriting the header information.The frag2 pre-processor is specificallydesigned to break down bundle discontinuity to search out noxious information in the sections, which iswhy this pre-processor ought to never be turned off.Stream4:preprocessor Snort uses to coordinate assault marks over numerous packets.Anattacker endeavors to send different parcels into the system conveying parts of the attackpayload which are required to be reassembled by the host so as to start an attack.Stream4 stores the bits of the mark until all bundles are transmitted.Once they are alltransmitted, Stream4 finishes the signature and an alarm is created.

Explanation:

8 0
3 years ago
Amtex Electronics, a consumer products brand, frequently advertises its products inside supermarkets and retail stores to promot
Aloiza [94]

Answer:

Amtex Electronics promotes the process of memory retrieval and stimulate purchase.

Explanation:

Recall or retrieval of memory refers to information from the past, which has encoded and stored in the brain. It is known as remembering.

For example, the memory of your son drinking juice is an example of retrieval. Memory had been stored in long- term memory.

Many types of memory retrieval are recall and recognition. This information must be retrieved from memories.

3 0
2 years ago
Look at the following assignment statements:
ziro4ka [17]

Answer: number 2 is the correct way to do it

Explanation:

3 0
2 years ago
Cuales son los multiplos de un byte
GalinKa [24]

Answer:

I hope this works for u

Explanation:

1 GIGABYTE = 1Gb = 1024 Mb = 1.000.000.000 bytes. 1 TERABYTE = 1Tb = 1024 Gb = 1 billon de bytes. 1 PETABYTE = 1Pb = 1024 Tb = Mill billones de bytes. 1 EXABYTE = 1 Eb = 1024 Pb = 1 trillon de bytes.

Can I have a brainliest..

Puedo tener un brainliest

Plz :3

8 0
2 years ago
If you were describing system software for your car, what would be the functions of the system software?
Marat540 [252]
B would be the correct answer
7 0
2 years ago
Other questions:
  • Which graphic design tool allows you to lay images on top of one another? A. Layers B. Selection C. Drawing D. Color
    10·2 answers
  • To differentiate the absolute pathnames to files that are located on different drives, html requires you to include the drive le
    8·1 answer
  • With network management software, a network manager can ____.
    6·1 answer
  • Help ASAP
    5·2 answers
  • why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?
    12·1 answer
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • the front desk of the Nocete's Hotel will comlute the total room sales (TRS) of Room 101.The room was occupied three times and t
    6·1 answer
  • HTML question please help
    5·1 answer
  • What when can you expect technology to be effective?
    12·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!