1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
12

Which organization publishes a handbook that describes various occupations?

Computers and Technology
1 answer:
valentina_108 [34]3 years ago
3 0

Answer:

<h2>Answer:<em> The Bureau of Labor Statistics (BLS), US Department of Labor publishes the Occupational Outlook Handbook.</em></h2>

Explanation:

The Occupational Outlook Handbook has information about the work, working environment, educational and training requirements, salaries and job outlook for several different occupations.

The BLS started publishing this handbook in 1948 and is published once in two years (biennially). Its latest edition is for the year 2018-2019. It is available for free on the Bureau of Labor Statistics website.

You might be interested in
An iphone is a form of a computer
Mrrafil [7]

Answer:

Yes it is

Explanation:

All smartphones are grouped into the Micro Computer family alongside PCs, Laptops and Hand Held devices.

8 0
3 years ago
Read 2 more answers
I dont get it all amndalwhcksjcsalicbkslcjdskjcmkjcnscjnksojsokcjidjche
Maurinko [17]

Answer:

w h a t

Explanation:

ednhw kebjhb2einirolm wbyuijkm nbvfcdxswaqwse4rtgyhujikol,km mnc

wbwjidjjjabyuveuns bgucdbbchgbcnahdvyibefkjdhbvjekhjqvshkcndjjjdgguuuuuuuuuebbbbbbbbbb

xn udjncibhegwvcbhkwniwbcebh8fr2y9hjoq;1bev

6 0
3 years ago
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
Which of these is NOT a operating system?
DochEvi [55]
A) Google Chrome

its a web browser
3 0
4 years ago
Read 2 more answers
in java Write a program with total change amount in pennies as an integer input, and output the change using the fewest coins, o
Keith_Richards [23]

Answer:

// Program is written in Java

// Comments are used for explanatory purposes

// Program starts here..

import java.util.*;

public class Money

{

public static void main(String [] args)

{

 Scanner input = new Scanner(System.in);

 // Declare Variables

 int amount, dollar, quarter, dime, nickel, penny;

 // Prompt user for input

 System.out.print("Amount: ");

 amount = input.nextInt();

 // Check if input is less than 1

 if(amount<=0)

  {

   System.out.print("No Change");

  }

 else

  {

   // Convert amount to various coins

   dollar = amount/100;

   amount = amount%100;

   quarter = amount/25;

   amount = amount%25;

   dime = amount/10;

   amount = amount%10;

   nickel = amount/5;

   penny = amount%5;

   // Print results

   if(dollar>=1)

    {

     if(dollar == 1) { System.out.print(dollar+" dollar\n");}

   else { System.out.print(dollar+" dollars\n"); }

}

if(quarter>=1)

{

if(quarter== 1)

{System.out.print(quarter+" quarter\n");}

else{System.out.print(quarter+" quarters\n");}

}

if(dime>=1)

{

if(dime == 1){System.out.print(dime+" dime\n");}

else{System.out.print(dime+" dimes\n");}

}

if(nickel>=1)

{

if(nickel == 1){System.out.print(nickel+" nickel\n");}

else{System.out.print(nickel+" nickels\n");}

}

if(penny>=1)

{

if(penny == 1) {System.out.print(penny+" penny\n");}

else { System.out.print(penny+" pennies\n"); }

}

}

}

}

See attachment for program file

Download java
3 0
3 years ago
Other questions:
  • You can use automatic link-checking software to identify invalid hyperlinks. if you find invalid links, what should you do next?
    13·1 answer
  • Largest operating expenses include
    7·1 answer
  • The internal movement of atoms in a substance creates
    14·1 answer
  • An indicator is a comprehensive analysis of critical information
    8·1 answer
  • Baking Cookies. Sweet Dough Inc. bakes cookies—a popular dessert—based on the quantities ordered by their customers. Three raw m
    12·1 answer
  • "In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system i
    7·2 answers
  • Which planet are the most dense
    14·2 answers
  • _____ is a valid URL, or internet address. In this URL, ______ indicates the protocol.
    10·1 answer
  • ......................... and ....................... are two ways to define the text in Inkscape.
    14·1 answer
  • comparative clinical and cost analysis between surgical and non-surgical intervention for knee osteoarthritiis
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!