1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
12

Vocational schools are also called all of the following except:

Computers and Technology
2 answers:
Gennadij [26K]3 years ago
8 0

community schools.

apex

Salsk061 [2.6K]3 years ago
7 0
A vocational school can also be called all of the following except a certification school.
You might be interested in
OSI layer for HDLC??​
tresset_1 [31]

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

3 0
3 years ago
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distr
hichkok12 [17]

Answer:C)Information management

Explanation: Information management is the technique through which the organization and handling of the the data/ information takes place.This technique is made for helping the organization and their business for the supporting the function and processes.

The facilities provided by the information management system is  development, management, designing, innovation etc.

Other options are incorrect because they are used for the coding process,technology and governing of the data, hence no management activity is done by them.Thus, the correct option is option(C).

4 0
3 years ago
What number system do people in America use?
Sindrei [870]

Answer:

Base-10 (decimal)

Explanation:

8 0
3 years ago
Read 2 more answers
When installing wire into a terminal it is important the stripped part of the wire
lianna [129]
D is the answer.......
5 0
3 years ago
Peter is software designer working at a big software company. He just found out that he has been shifted to their downtown branc
sweet [91]

The managers at Peter’s company have an Autocratic environment.

<u>Explanation:</u>

The managers who are autocratic in nature make decisions on their own. They will never get insights of their employees and they will not take the inputs of them in taking any decisions. This type of management is suitable in an organisation where there is an urgent need to taking decisions to any matter.

Managers who are autocratic in nature will make decisions without consulting anyone's advice.  This type suits those organisations wherein there are very less number of employees. Here, the manager of Peter did not consulted peter in making decisions related to him, the environment is authoritarian or autocratic.  

7 0
3 years ago
Other questions:
  • _____ is two or more connected computers.
    8·1 answer
  • What are the basic computer components that must be purchased in order for the computer to function efficiently?
    11·1 answer
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio
    9·2 answers
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    6·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!