1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
5

List 5 kinds of acquaintances who told Debbie Fields would fail? right answer only

Computers and Technology
2 answers:
Mamont248 [21]3 years ago
3 0
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
FinnZ [79.3K]3 years ago
3 0

Mrs. Fields' Original Cookies, Inc. has expanded from one store which was started in 1977, to over 1,500 stores. This is a true story of an American homemaker who overcame major hurdles to create an international business. Having acquired a skill when she was a little girl, Debbi Fields decided to start a business. However, everybody said she would fail.

Her husband’s business acquaintances enjoyed her cookies but were the first ones to advise her that it would be a “bad idea” and that it would never work. Her husband went along with Debbi’s idea, but deep down, he did not believe in her dreams. Debbi pressed on and went ahead to borrow a bank loan. Their banker trusted the young couple to pay back their borrowed loan, even though he expected the business to fail as well. Debbi’s friends and her fellow college students , her own mother, and her in-laws said she would fail.

You might be interested in
The implementation stage of the SDLC _____.
Karolina [17]

Answer:

d. involves analyzing end-user business requirements in order to refine project goals

Explanation:

In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.

For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.

6 0
2 years ago
To secure the company website, the webmaster suggests that the company purchase a secure certificate to encrypt all communicatio
iVinArrow [24]

Answer: Software

Explanation:

Security certificate is defined as the assurance that maintain authenticity and intactness of a website or different sites.It is present in small sized data filed that establishes encryption and validation through verification of owner's identity.

  • As per the suggestion of Webmaster, who takes care of web-pages and web-servers , security certificate should be purchased to verify the transmission of message with encryption.
  • Certificate in this case will be acting as software for providing security and operations to the websites.

4 0
3 years ago
In a __________, you are trying to find what others have prepared. With __________, you are trying to discover new patterns that
AveGali [126]

Answer:

<u>query,</u> <u>data mining </u>

Explanation:

A query can be explained as another term for question.

If one needs additional information from some other person, he might have ask to him. Queries are used for the retrieval of the information.

In other words, one tries to find what have been prepared by others.

Data mining can be explained as the process that allows to sort through a large set of data for the identification of patterns.

In this process of data mining, one tries to find out the new patterns that may not be known at all.

3 0
3 years ago
When you send an email how many computers does it go to
Xelga [282]

once you have sent the email it will only go to the server which then the person receiving it would log on therefore requesting the emails recived.

I'm not 100% sure my answer is classed as correct but I would say it doesn't go to a computer it just gets stored on a server in till requested

4 0
3 years ago
What is the device used for the calculations of payment and balancing the accounts record s​
Greeley [361]
A calculator or bank? Maybe an atm
6 0
1 year ago
Read 2 more answers
Other questions:
  • When you copy text, the selected text is copied from the original location and placed on the
    9·1 answer
  • Climate is considered a(n) _______ limiting factor. (2 points)
    9·1 answer
  • Fedora operating system
    9·1 answer
  • A rang check that could be use to validate... Date and time
    13·1 answer
  • ​Client/server computing is​ a: A. network that connects sensors to desktop computers. B. distributed computing model where clie
    12·1 answer
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • I nees the meaning of these words even just one of them would help out ( pixel megapixel colour depth bit and byte)
    15·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
    7·1 answer
  • Write a Python program that uses three variables. The variables in your program
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!