1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
5

A written document containing a description of a property as of the day of inspection is called a(n) 

Computers and Technology
1 answer:
meriva3 years ago
5 0
D. An inspection report! Hope this helps!
You might be interested in
To change the backround color of a page, which tab would you use?
ivann1987 [24]
I have concluded the answer is a
4 0
3 years ago
Read 2 more answers
Write a function which the counts the number of odd numbers and even numbers currently in the stack and prints the results.
Lerok [7]

Answer:

See the code below and the algorithm explanation on the figure.

Explanation:

The explanation in order to get the answer is given on the figure below.

Solving this problem with C. The program is given below:

#include <stdio.h>

int main(void) {

   int n, Even=0, Odd=0, Zeros=0;  

   for (;;) {

       printf("\nEnter the value the value that you want to check(remember just integers): ");

       //IF we input a non-numeric character the code end;

       if (scanf("%d", &n) != 1) break;

       if (n == 0) {

           Zeros++;

       }

       else {

           if (n % 2) {

               Even++;

           }

           else {

               Odd++;

           }

       }

   }  

   printf("for this case we have %d even, %d odd, and %d zero values.", Even, Odd, Zeros);

   return 0;

}

5 0
3 years ago
What email server does Global Enterprises use?
harina [27]

Answer:

Global Enterprises uses an open source mail server called Courier.

Explanation:

6 0
3 years ago
C++
kirill [66]

Answer:

Um im i supposed to read all of that im hell no anyways bye bestie have fun

4 0
3 years ago
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho
Rzqust [24]

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

5 0
3 years ago
Other questions:
  • Write a Java method to delete a record from a B-tree of order n.
    13·1 answer
  • How can we set the color of a text that acts as a link in a web page​
    10·2 answers
  • What is the property of the Magnetic Lasso tool?
    6·2 answers
  • What date does GTA 6 come out<br> A. 2020<br> B. 2019<br> C. 2021<br> D. 2022
    10·2 answers
  • Does anyone know the point of gradpoint?
    8·1 answer
  • Assume that a file contains students' ids, full names, and their scores (Assignments grade, quizzes grade,
    5·1 answer
  • wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations
    11·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • Over the last decade, the overall energy consumption of cloud data centers worldwide has remained relatively the same. Why is th
    15·1 answer
  • clinical outcomes and survival differences between primary, secondary and concomitants carcinoma in situ of urinary bladder trea
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!