1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
13

A person who is skilled at performing calculations, has math skills for advanced analysis, and has organizational skills would b

e best suited to work as
Computers and Technology
2 answers:
Harman [31]3 years ago
3 0
A mathematician because of all their skills they have they suit the job
Crazy boy [7]3 years ago
3 0

brainly.com/profile/ninjalamb8-11156915 wrong! The correct answer is c

You might be interested in
What is a document?read.Miércoles, 19 de agosto ¡Saludos Mario! ¿Cómo estás amigo? ¿Cómo está tu familia en Caracas? Mi familia
natka813 [3]

Answer:

A Document is a virtual paper that you can type on

Explanation:

A piece of written or electronic paper that provides information or evidence or that serves as an record.

7 0
3 years ago
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
k0ka [10]

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

8 0
2 years ago
What can help prevent issues related to downloading content from the internet?
vodka [1.7K]

Answer:

D)

Explanation:

3 0
3 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
What can you do to keep safe when using a ladder?
dexar [7]
If the ladder is not stable, it is better to have someone hold the ladder in the bottom ( only someone who is strong and confident)
6 0
3 years ago
Other questions:
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • What is a main cause of an aurora?
    8·1 answer
  • Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, i
    15·1 answer
  • Which of the following is a web app?
    5·1 answer
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • Is a defense of a political position an argument
    7·1 answer
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • Hey should I get a r()blox gift card if so what amount 5 dollars 10 or 100
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!