1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
5

List 5 kinds of acquaintances who told Debbie Fields would fail? right answer only

Computers and Technology
2 answers:
Mamont248 [21]3 years ago
3 0
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
FinnZ [79.3K]3 years ago
3 0

Mrs. Fields' Original Cookies, Inc. has expanded from one store which was started in 1977, to over 1,500 stores. This is a true story of an American homemaker who overcame major hurdles to create an international business. Having acquired a skill when she was a little girl, Debbi Fields decided to start a business. However, everybody said she would fail.

Her husband’s business acquaintances enjoyed her cookies but were the first ones to advise her that it would be a “bad idea” and that it would never work. Her husband went along with Debbi’s idea, but deep down, he did not believe in her dreams. Debbi pressed on and went ahead to borrow a bank loan. Their banker trusted the young couple to pay back their borrowed loan, even though he expected the business to fail as well. Debbi’s friends and her fellow college students , her own mother, and her in-laws said she would fail.

You might be interested in
A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application
Ratling [72]
<span>Five questions that people are most likely to ask about the application are as follows:1. What is the use and function of this application?. 2. Who is this application for? 3. How much does this application cost?. 4. Where can the application been used? and 5. Why should I use this application? </span>
7 0
3 years ago
What is a scenario where records stored in a computer frequently need to be checked
vazorg [7]

if your in  school and always are getting into trouble the school will always be checking your records


7 0
3 years ago
Read 2 more answers
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
3 years ago
Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what
lana66690 [7]

Answer:

A, B, E and F Brainliest please

Explanation:

8 0
3 years ago
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise moni
insens350 [35]

Answer:

Computer monitoring software

Explanation:

Computer monitoring software is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone’s computer activity.

4 0
3 years ago
Read 2 more answers
Other questions:
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
    11·1 answer
  • Which type of financial institution typically has membership requirements?
    9·2 answers
  • The operating system’s application programming interface (API) provides software developers with tools they use to build applica
    5·1 answer
  • What is network management?
    12·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • Why computer manufacturers constantly releasing faster computers ?
    14·1 answer
  • Hmm what should i do with this information
    14·2 answers
  • Find the double word-length 2's complement representation of each of the following decimal numbers:a. 3874
    12·1 answer
  • Answer for 3.4.8 rectangle code HS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!