1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
12

What is the foundational domain for business

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
7 0

a fundamental domain or fundamental region is a subset of the space which contains exactly one point from each of these orbits . It serves as a geometric realisation for the abstract set of representatives of the orbits . There are many ways to choose a fundamental domain .

hope this help

You might be interested in
This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identi
allsm [11]

Answer: d

Explanation: hope this helps

6 0
3 years ago
Read 2 more answers
Why does the position of drawCircle(x, y, r) in the answer choices matter?
Andrei [34K]

Answer:

B and C

Explanation:

xPos and yPos determine the center of the circle, and rad determines the radius of the circle drawn.

It cannot be A because it starts drawing a circle with the center of (4, 1). None of the circles ahve a center at (4, 1). It is B because while it does start at (4, 1), the repeat function adds one to the y and radius. While ti repeats 3 times it ends up drawing all 3 circles. C also works because it starts by drawing the biggest circle and then subtracting the values to make the other two. It cannot be D because in the repeat function it subtracts from the y value and radius too early, it doesn't draw the biggest circle.

6 0
2 years ago
How do you delete your brainly account
Artyom0805 [142]

Answer:

moderators only can banned you and delete all

5 0
3 years ago
One day a subcontractor calls him saying that he needs a replacement check for the job he completed at 1437 Elm Street. Jonathan
zavuch27 [327]

Answer:

investigate where is checkbook or ledger in the accounting program, and this is a serious issue. The check needs to be done immediately, as the complete ledger is missing.

Explanation:

Ledger is the register in which all the transaction details are being given. The company whole account details is being mentioned in the ledger. We also know  ledger as the checkbook. Undoubtedly, this s a serious issue as the complete ledger is missing. Hence, the process of investigation needs to be done immediately. However,  he will first ask the other person who has the access to the accounting software. One should understand that all the details are in the ledger, and hence Jonathon needs to find the missing Ledger, and only then the error can be corrected.

4 0
3 years ago
What can amber do to make sure no one else can access her document?
Lelu [443]

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

7 0
3 years ago
Read 2 more answers
Other questions:
  • ________ employees state-of-the-art computer software and hardware to help people work better together.
    15·1 answer
  • File Explorer contains ribbon tabs that can be used for various functions. Which ribbon tab provides options to open a new File
    11·1 answer
  • In order for Dr. Reynolds to send a CPOE from her office computer system to the computer system at the local hospital, a/an ____
    5·1 answer
  • How do headphones work? (From pc)
    8·1 answer
  • Sierra owns a small business and handles many responsibilities, from logistics to marketing. She's seen a lot of success with Go
    11·1 answer
  • Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
    11·1 answer
  • In a c program, if you see a variable in main declared: float farray[20]; describe what farray is
    10·1 answer
  • Two machines can finish a job in StartFraction 20 Over 9 EndFraction hours. Working​ alone, one machine would take one hour long
    10·1 answer
  • Which statements accurately describe the Outlook interface? Check all that apply.
    7·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!