1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
4 years ago
12

Select the correct answer. Vlad wants to include his goals and target in his résumé. He also wants to add how he can be benefici

al to the company. In which section should he add these details? A. objective B. achievements C. additional information D. cover letter
Computers and Technology
1 answer:
Alla [95]4 years ago
6 0

Answer:

Goals and targets in A

how he can be beneficial to the company in cover letter

Explanation:

While writing a resume goals and targets are added to objectives section.Which briefly describes your goals and gives a hint on your overall motives to join an organizations.While to add other information like how can you be beneficial for company a cover letter is attached with resume which contains information like why you are best fit for the job and  how can you be beneficial for this job.

Cover letter makes great first impressions and sometimes basic screening is done on the basis of cover letters.

You might be interested in
The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
Andru [333]

Please specify the programming language.


3 0
3 years ago
Cloud offers better protection compare to on premise?​
dangina [55]

Why is cloud better than on-premise? Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies.

The security of the cloud vs. on-premises is a key consideration in this debate. Cloud security controls have historically been considered less robust than onprem ones, but cloud computing is no longer a new technology. . A company running its own on-premises servers retains more complete control over security.

Believe it!!

Pls follow me.

6 0
3 years ago
Discuss operations of vectors in computer graphics?
Allushta [10]

Answer:

  In the computer graphics, the vectors are basically used to compose various type of components. In the computer graphics it is basically known as vector graphics and it is composed of various types of components.

The operation of the vector in the computer vector is that it is basically used to create the digital images by the use of mathematical statement and command.

It is used to place the lines and the shape in the two- dimension and three- dimension spaces. IN the computer graphics, vectors are also used to represent the particular direction of the various objects.

6 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
Who invented the Graphical User Interface (GUI)?
Ludmilka [50]
The Graphical User Interface was invented by <span>Xerox PARC by </span>Alan Kay<span>, </span>Douglas Engelbart
5 0
3 years ago
Other questions:
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
    7·2 answers
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    8·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • Explain the reason why vector graphics are highly recommended for logo​
    5·1 answer
  • Any correct answers will be helpful.
    13·1 answer
  • Why do my airpods keep disconnecting from my laptop
    8·2 answers
  • Why is my computer fans making weird noises?
    12·2 answers
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!