1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
4 years ago
9

Buying a house is most likely a long-term goal for a person of which of these

Computers and Technology
1 answer:
vekshin14 years ago
5 0

Answer:

B  i think

Explanation:

You might be interested in
1k bits equals to how many bits
ruslelena [56]

Answer:

1000 bits

Explanation:

hope it helps :D

8 0
3 years ago
Cultural competence​ involves
IrinaK [193]

Answer:

Cultural competence involves more than having sensitivity or awareness of cultures. It necessitates an active process of learning and developing skills to engage effectively in cross-cultural situations and re-evaluating these skills over time.

Explanation:

3 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
Zigmanuir [339]

Answer:

push the add your answer button

Explanation:

4 0
3 years ago
Read 2 more answers
WILL UPVOTE ALL.
scoundrel [369]
Ummmmm....... i would say true, hope that helped, if not im super sorry :)
7 0
3 years ago
Other questions:
  • Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in
    11·1 answer
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • If you need to write a function that will compute the cost of some candy, where each piece costs 25 cents, which would be an app
    5·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • What type of data uses numbers that can be used in the arithmetic operations?
    14·1 answer
  • Highlights the possible risks and problems that should be addressed during the implementation process
    6·1 answer
  • Common separators or delimiters used when converting a table to text include _______________________ , paragraph marks, or comma
    14·1 answer
  • Which of these is an example of input?
    6·1 answer
  • Which of these is true about moores law
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!