1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
5

What’s the best description of an opportunity cost

Computers and Technology
1 answer:
yulyashka [42]3 years ago
6 0

Answer:

Its the choice vs next highest valued alternative.

Example:

Getting out of bed this morning instead of staying in bed.

You might be interested in
_____ is two or more connected computers.
aliya0001 [1]
A Network

A Network is a connection of computers. Imagine lots of people joined together. You might call that a network.
5 0
3 years ago
Coffee shops worldwide throw away billions of paper cups each year. Discuss
garik1379 [7]

Answer:

They should give out a coffee cup to each person and charge full price for the first time that you fill the cup but then after they finish the first drink they should offer a discount if you reuse the same cup. They should tell you that you can bring back coffee cups from even a few days ago and you could still be eligible for the discount. This way even people that don't drink as much coffee can still be eligible to get a discount on their coffee.

Explanation:

:)

4 0
2 years ago
What acts as a platform on which application software runs?
Readme [11.4K]
A computing platform
5 0
3 years ago
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
If you want a user to enter exactly 20 values, which loop would be the best to use?
Hitman42 [59]

Answer: For loop

Explanation:

Using the for loop we can get the exact number of values/outcomes we require.

For example:    printf(enter 20 numbers");

                               for(int i=0; i<20;i++)

                               {

                                       scanf("%d", &number);

                                }

So, this is an implementation of for loop in C. Using it we can enter exact 20 numbers not less or more than that.

Therefore, for loop is the answer.

4 0
3 years ago
Other questions:
  • You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ...,
    13·1 answer
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    10·1 answer
  • public interface Displayable { void display(); } public class Picture implements Displayable { private int size; public void inc
    14·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • ☢☢☢does anyone know how to do the TYNKER CANNON assignment ( lesson 2 intro to game design) I'll give BRANLIEST(¬‿¬)❤ dont answe
    11·2 answers
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!