1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
13

What could be a possible problem with relying on public transport she might experience and what could she do about it?

Computers and Technology
1 answer:
MrRissso [65]3 years ago
8 0

Answer:

Free transit is a poor substitute for making drivers pay actual costs of driving. Free anything makes people use it too much.

Explanation:

You might be interested in
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
4 years ago
Read 2 more answers
If you are signed into a Microsoft account and need to sign into another one, click ____ on the list arrow next to Your Name in
torisob [31]

Answer:

left

Explanation:

If you are signed into a Microsoft account and need to sign into another one, click left on the list arrow next to Your Name in the top-right corner of the Word window.

Multiple Microsoft accounts can be opened at one time in different tabs of your computer. They can be used simultaneously as well. It helps the user to work efficiently rather than logging in or logging out from his accounts which hinders effective and efficient output.

5 0
3 years ago
File Letter Counter
Zanzabum

Answer:

The solution code is written in Python.

  1. fileName = input("Enter file name: ")
  2. target = input("Enter target character: ")
  3. with open(fileName, "r")as reader:
  4.    content = reader.read()
  5.    print(content.count(target))

Explanation:

Firstly, use <em>input() </em>function to prompt user for a file name. (Line 1)

Next, we use input() function again to prompt user input a target character (Line 2)

Create a reader object and user <em>read() </em>method to copy entire texts from to the variable<em> content </em>(Line 4 - 5).

At last we can get the number of times the specified character appears in the file using the Python string built-in method <em>count() </em>(Line 6)

5 0
4 years ago
You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
Rasek [7]

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

6 0
2 years ago
Which quality determines an individual's ability to be open to changes and complete tasks in an ever-changing work environment?
MrMuchimi

Answer

Flexibility

Explanation:

8 0
3 years ago
Other questions:
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • Should i change my profile pic<br> dont delete
    15·2 answers
  • What are the factors affecting the purchasing decision for dbms software?
    7·2 answers
  • What is related to Gamut in Adobe illustrator?
    8·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • 4) Short answer questions<br>c) What is Cyber Law?​
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    5·1 answer
  • In the program below, numA is a _____.
    8·2 answers
  • Which of these is true of blackhat and whitehat hackers?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!