1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
8

Before applying for a job, job seekers should

Computers and Technology
2 answers:
gayaneshka [121]3 years ago
6 0

Answer:

discover if they have the necessary skills

Explanation:

you cant get the job if you don't have the necessary skills for the job i that case your just wasting your time doing nothing.

svetoff [14.1K]3 years ago
3 0
All of above. It is important to see which job would be a good fit and to find out if you have the necessary skills.
You might be interested in
Which Operating System is used most often in households?
pshichka [43]

Answer:

Windows

Explanation:

Windows are one of the most popular household os.

3 0
2 years ago
Read 2 more answers
The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
Andru [333]

Answer:

light year

Explanation:

Its is equal to 9,500,000,000,000km

5 0
3 years ago
A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016)
BARSIC [14]

Answer:

The Ribbon is composed of three parts: Tabs, Groups, and Commands.

4 0
3 years ago
Which statement is true about laptops? Laptops use fewer components than desktops use. Most of the internal components that are
elena-14-01-66 [18.8K]

Answer:

Option 2 is correct.

Explanation:

Option 2 is correct because most of the components used in laptop is far different from Desktops. They are not able to fix in desktops. They are designed specially for laptops.

8 0
3 years ago
Read 2 more answers
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A user can set the security and privacy settings on what is displayed in the message bar from the ________ within the options me
    8·1 answer
  • In risk management what does risk evaluation involved
    14·1 answer
  • What is text box and label control​
    10·2 answers
  • What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
    10·1 answer
  • My question is do you learn how to do a voice over in technology?
    14·1 answer
  • Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at
    9·1 answer
  • The 'WIMP' environment is much more user friendly,why?​
    11·2 answers
  • 3.4 lesson practice quiz edhesive
    11·1 answer
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
  • Hi am feeling really happy just passed a test after a lot of tries :-)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!