1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
13

When creating a report, you should consider all of the following EXCEPT (Points : 4) who will use the report

Computers and Technology
1 answer:
barxatty [35]3 years ago
8 0

Answer: Number of records input into the report

Explanation: Creating the report includes the factors like maintaining the record, updating data, designing content etc. The content of the report has the parameter to maintain so that it can be up to date and can be efficient to the user.

The parameters that are considered while making the report are confidential content should be specially considered ,user of the report , purpose of the report,etc. The only factor that is not accountable is input.There can be number of inputs that can be entered in the report because they have huge sheet space.

You might be interested in
The only requirement of __________ is that the sender must provide some mechanism whereby the receiver can opt out of future ema
fiasKO [112]

Answer:

The CAN-SPAM Act

Explanation:

Email or electronic mail is an information system mechanism of communication, that involves the use of digital devices to initiate communication over the internet. The email uses several protocols like the POP3, IMAP etc.

The CAN-SPAM Act is proposed in the United States law, applicable to email investigations. It requires that a sender provides a mechanism whereby the receiver can opt out of future emails without a fee.

4 0
3 years ago
why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
frozen [14]
Try linking an email to your account, if it doesn’t work select forgot your password and you should receive an email where you can re make or change your password to something easier to remember. Are you using the same email account every time, this may also be the reason, if it is the same email they will not allow you to reuse it and it should tell you the email is already in use. Hope this helped
5 0
3 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
8. What do you believe: should husbands make decisions for their wives.
nirvana33 [79]

Answer:

No.

Explanation:

Because wives should make decisions for their life themselves.It helps them be self dependent so that they won't have to depend on their husbands. By letting them make decisions themselves they can get a successful career on their own effort and decisions.

3 0
3 years ago
ROM is designed for _________
Sidana [21]
Computer Instructions

ROM, or Read Only Memory is used to store instructions as it retains memory even after power loss.
6 0
3 years ago
Other questions:
  • Did you see the fire, uh, fireworks last night? Which of the following sentences is the most correct way to format this accordin
    15·2 answers
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • A provides an easy way for workers to interact with their computers
    9·1 answer
  • For any two documents x and z, define k(x, z) to equal the number of unique words that occur in both x and z (i.e., the size of
    15·1 answer
  • Servlet session and JSP session have different abilities.TrueFalse
    9·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • ASAP BRAINLIEST!!!
    6·1 answer
  • What type of error occurred with the code below??
    11·1 answer
  • What is the console.log function for?​
    13·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!