1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
11

Compare this country early use of credit to its use today?

Computers and Technology
1 answer:
Stolb23 [73]3 years ago
7 0

Answer:

Explanation:

A credit is a financial transaction where someone takes a loan for a certain amount of money to another person, and this another must pay this money in a period of time, determinate from both parts, in this case, a country can get a credit, if this country pay this debt, the country will have a good record, and they can to ask another credit, but if they don't pay, the debt will be bigger.

You might be interested in
22. A user receives an error message when logging into Salesforce. What is the first check performed by an administrator?
WARRIOR [948]

Answer:

The first check performed by an administrator that it  View the login history.

Explanation:

When user logging into Salesforce it receives an error message into the  screen it view the logging detail which help us take to troubleshoot the problem. The logging history keeps track information like  who is access the system last time ,date etc .login history  also display up to 20,000 records of user logins for the last six months.

4 0
3 years ago
Jennifer has written a short story for children. What should be her last step before she submits the story for publication? A) p
erik [133]
It would be a or c when she is writing a childerns story
5 0
3 years ago
Read 2 more answers
_ includes websites that encourage interaction and connection among people, businesses, and organizations. A. News sites B. Sear
Dovator [93]
> News sites give information about news or what is trending around the area or world (CNN, Fox, MSNBC, etc) 

> Search engines is what allows you to look up websites (Google, Bing, Yahoo, etc) 

> Social media AKA Social Networking sites is interaction social sites where you connect with various people from around the world. (Facebook, Twitter, Google+, etc)

>Apps is short for applications which is an application that has a specific function (Games, Music, Social networking) 

So based on this, you answer is C. Social Media
6 0
3 years ago
Read 2 more answers
Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
jonny [76]
Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


8 0
3 years ago
Read 2 more answers
Evaluate the advantages and disadvantages of cloud computing.
rewona [7]

Answer:

The advantages and disadvantages of the given instance are described below.

Explanation:

<u>Advantage</u>:

  • Cost reductions are the greatest advantages of cloud computing. It lets users conserve considerable capital costs and they wouldn't need any actual hardware expenditure.

<u>Disadvantage</u>:

  • If you operate in something like a cloud system, your program is operating on a platform that offers services to these other organizations at around the same time.
7 0
2 years ago
Other questions:
  • How to delete audio from powerpoint​
    13·1 answer
  • You can execute three main types of linux commands. what are they?
    8·1 answer
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
    6·2 answers
  • PLEASE HELP ME ASAP!!!!
    11·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • How is scale depicted on a flat video screen?
    13·1 answer
  • 4. Compute the following additions
    7·1 answer
  • Lenny copied and pasted content from a commercial website into his research paper without citing his source, passing the work of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!