1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
5

Sharon is thinking about opening a bakery. She knows she wants to set her own hours, reduce her stress and make a profit. But sh

e still has a lot to think through. Which of the following would not be a good early step?
A: Immediately finding a storefront property for her business, putting down a deposit, and signing a lease.

B: Contacting a mentor who has experience in the restaurant industry.

C: Creating an initial elevator pitch with her limited information and starting to ask around for advice.

D: Beginning to estimate her target market for her business.
Computers and Technology
1 answer:
kondaur [170]3 years ago
6 0
C would not be a beginner move.

hope it helps
You might be interested in
Double clicking the top right corner of a document will
Novosadov [1.4K]

Answer:

open the header. hope this helps

8 0
3 years ago
Help Asap! Marking brainliest!✨
gulaghasi [49]

Answer:

The answer would be After the slide you are viewing.

I hope this helped!

8 0
3 years ago
Read 2 more answers
Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
omeli [17]

Frank who want to install a software program on a single server with multiple users connected should consider cloud computing. This type of computing delivers convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of configurable computing resources, which is exactly what Frank needs.

3 0
3 years ago
Read 2 more answers
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Your personality is that of everyone else
lubasha [3.4K]

hmmmmm but is it really

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which routine best ensures email safety?
    7·2 answers
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • Write a Python program calculate summary statistics about a class assignment. First, prompt the user for the number scores to be
    6·1 answer
  • Give 4 examples of mnemonic codes, and what do they do?
    15·1 answer
  • On a rheostat the first terminal is connected to a
    14·1 answer
  • What will the following code display? int numbers[4] = { 99, 87 }; cout << numbers[3] << endl; a. 87 b.0 d. 34. What
    12·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • What does mean in computer science
    10·1 answer
  • nts/viewer/classes/289ef1a5d7c341c284010 Select the compound inequality shown on the graph. 5 4 3 2 1 0 1 2 를 4​
    6·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!