1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
12

How many people employed in the United States work in a job related to digital media?

Computers and Technology
1 answer:
polet [3.4K]3 years ago
5 0
I feel like more people are employed in the united states more than ever
You might be interested in
3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
Georgia [21]
Classes called child classes or subclasses inherit methods and variables
4 0
3 years ago
HELP ASAP!!!
stiks02 [169]
Comparison would be most suitable. I hope I could be a help


7 0
4 years ago
Read 2 more answers
Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of strings
Ghella [55]

Answer:

count = 0;

longest =0;

String myString = new String();

while (input.hasNext()){

myString = input.next();

if (myString.length() == longest) count++;

else

if (myString.length() > longest){

longest = myString.length();

count = 1;

}

}

Explanation:

5 0
3 years ago
Read 2 more answers
What should you do when asked to take down a detailed message for your manager or supervisor?
katovenus [111]
A makes most sense to me. What if you forget that a voicemail was left? Its better to have them call back later. And if the manager isn't there in an hour have them then leave a voicemail.
8 0
3 years ago
Read 2 more answers
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Other questions:
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
    10·2 answers
  • : What is the difference between the Audio Mixer and the<br> Audio Meters Panel?
    7·2 answers
  • BRAINLIEST AND A LOT OF PTS Which line of code will only allow a symbol to be stored in a variable?
    12·2 answers
  • Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
    10·1 answer
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • I don't know what to do for these two questions
    13·1 answer
  • The words, the computer is the future, has how many bits?
    12·1 answer
  • GoodArray hackerrank solution for a number N, a goodArray is the smallest possible array that consists of only powers of two
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!