1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
4 years ago
5

List 5 kinds of acquaintances who told Debbie Fields would fail? right answer only

Computers and Technology
2 answers:
Mamont248 [21]4 years ago
3 0
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
FinnZ [79.3K]4 years ago
3 0

Mrs. Fields' Original Cookies, Inc. has expanded from one store which was started in 1977, to over 1,500 stores. This is a true story of an American homemaker who overcame major hurdles to create an international business. Having acquired a skill when she was a little girl, Debbi Fields decided to start a business. However, everybody said she would fail.

Her husband’s business acquaintances enjoyed her cookies but were the first ones to advise her that it would be a “bad idea” and that it would never work. Her husband went along with Debbi’s idea, but deep down, he did not believe in her dreams. Debbi pressed on and went ahead to borrow a bank loan. Their banker trusted the young couple to pay back their borrowed loan, even though he expected the business to fail as well. Debbi’s friends and her fellow college students , her own mother, and her in-laws said she would fail.

You might be interested in
Java Programming home &gt; 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
Andru [333]

Answer:

The following are the code to this question:

code:

System.out.println(x);  //use print method to print value.

Explanation:

In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.  

In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.

It's to demonstrate that the input/output or testing requirements function throughout the model.

5 0
4 years ago
Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
Svetach [21]

slide transition effect.

5 0
3 years ago
write an algorithm that gets two values: the price for item A and the quantity purchased. The algorithm should then print the to
pochemuha

Answer:

Explanation:

price = eval(input("price of item: "))

quantity = eval(input("quantity of item: "))

sales_tax = 0.08 # 8% sales tax

total_cost = price*quantity

total_cost_with_tax = total_cost + total_cost*sales_tax

print("total cost: "+str(total_cost))

print("total cost + 8% sales tax: "+str(total_cost_with_tax))

5 0
4 years ago
What is the indication when a student conducting an electronic search of the literature is simultaneously using two databases, p
aivan3 [116]

Generate more than 2000 citations is The keywords were not sufficiently narrowed.

<h3>Why utilize PubMed as a database?</h3>

PubMed is the standard database that is used in the healthcare profession. It has the ability to link to full-text articles, provides advance researching including filtering and superior queries and links to related articles.

<h3>What are the restrictions of PubMed?</h3>

The newest articles in PubMed may not yet be indexed for MEDLINE. There is a short lag time (a few days to many weeks) between when authorities enter the PubMed database and when they are described with MeSH terms. An article you require is not indexed for MEDLINE

To learn more about PubMed , refer

brainly.com/question/602370

#SPJ4

A. There has been a great deal of research in this area.

B. CINAHL and MEDLINE duplicate the literature.

C. The keywords were not sufficiently narrowed.

D. A third database is necessary to limit the search.

5 0
2 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
    15·1 answer
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • What is an allocation unit?
    10·1 answer
  • Which programming language is good for 14 year old like me​
    12·2 answers
  • What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
    15·1 answer
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • Java
    5·1 answer
  • Which disipline involves creating computer networks
    13·2 answers
  • In what ways can information be slanted in a news report?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!