1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
2 years ago
9

Shelby is in a college course for half the day and then goes to high school. What program is she in?

Computers and Technology
2 answers:
Alexus [3.1K]2 years ago
7 0
Dual Credit: Dual credit allows you to take a college course while in High school to earn that particular credit! Hope this helps. 
krok68 [10]2 years ago
7 0

Answer:

Dual Credit

Explanation:

Dual credit gives highschool students the opportunity to enter college course while still being in highschool, earning credits in college before entering and finishing high school, some of them end up highschool having as many credits as college sophomores, depending on how many dua credit courses they take, so Shelby is enrolled in a dual credit program.

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
PLEASE HELP
kramer
Style  would be the great and best answer but you could add office decor
7 0
3 years ago
Read 2 more answers
I really need the answer now!!
guajiro [1.7K]

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

4 0
2 years ago
The RAM memory of a computer contains the volatile memory, which includes
lara31 [8.8K]

The RAM memory of a computer contains the volatile memory, which includes; Websites recently visited

<h3>Random Access Memory(RAM)</h3>

Random access memory (RAM) is defined as a computer's short-term memory that it utilizes to handle all active tasks and applications.

Now, no single program, file, game, or stream would work without a RAM. Thus, RAM is a temporary storage that goes away when we shut down the computer.

Examples of things that RAM store from the options given is only websites visited recently.

Read more about Random Access Memory at; brainly.com/question/86807

3 0
2 years ago
Boosting morale in a workplace through reorientation is accomplished by giving employees _____. a. snacks and drinks b. the same
bixtya [17]
Snacks and Drinks (A)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • According to ________ law, in a sealed chamber, the pressure and temperature of a gas are directly related to each other.
    10·1 answer
  • A statement describing both the requirements that must be met by a product or process amd the ways in which satisfaction of the
    8·2 answers
  • Question 1 (1 point)
    10·2 answers
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • To read visual and audio text means
    11·1 answer
  • Defensive programming is sometimes referred to as _________.
    5·1 answer
  • ¿por que hay peligros en internet?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!