1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
10

Click this link to view O*NET’s Work Contexts section for Librarians.

Computers and Technology
2 answers:
Softa [21]3 years ago
5 0

Answer:

1. b,d,f  2. a,b,c,f  3. b,c,e,f  4. a,c  5. a,b,c,e  6. a,b,c

7. d,e,f  8. a,b,e,f   9. a,c,d  10. b,d,f  11. c,e,f  12. a,c,e,f

Explanation:

all the answers to Finance Workplaces and Tasks Assignment 100%

statuscvo [17]3 years ago
3 0

Answer:

It's A,D,E,F

Explanation:

You might be interested in
How do you render and export files on blender
Debora [2.8K]

Answer:

Save your Blender file (. blend) in the same folder as your . obj file, if you didn't already.

Click on File/External Data/Pack All into . blend.

Click on File/External Data/Unpack All Into Files.

Choose "Use files in current directory (create when necessary)"

Explanation:

<em>Hope </em><em>it </em><em>helps </em><em>ya </em><em>ItzAlex</em>

6 0
3 years ago
What is a unit to measure loudness
FinnZ [79.3K]

decibels i believe is the correct answer. hope it helps :)

3 0
3 years ago
A short cut to save a file is
Vanyuwa [196]

Answer:

CTRL+S in most programs

8 0
3 years ago
Consider the packets exchanged in TCP connection setup between Host A and Host B. Assume that Host A's initial sequence number i
Rasek [7]

Answer:

I think that part C correct option

6 0
3 years ago
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
Other questions:
  • Which social media marketing concept engages visitors, getting them to revisit your website and tying them to offline events for
    7·2 answers
  • Which type of loop only runs while a condition is true?
    11·2 answers
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • PLZ HELP ME ITS URGENT PlZ PLZ PLZ
    11·1 answer
  • Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
    9·1 answer
  • What department is cyber security
    6·2 answers
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • Name 4 components of a components system​
    9·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!