1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
7

The keys to successful outsourcing are accountability, reporting, and ___

Computers and Technology
1 answer:
pav-90 [236]3 years ago
5 0

Answer:

responsible?

Explanation:

I believe this is the answer sry

You might be interested in
You can not give an exact size for a height for column width true or false
GalinKa [24]

Answer:

~false~

Explanation:

5 0
3 years ago
1 2
sweet [91]

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

6 0
3 years ago
Read 2 more answers
U GET BRAINLIEST HELP PLZ
Art [367]
BOTH OF THEM ARE C : )
3 0
3 years ago
In which decade did personal computers become commonplace in offices, schools, and some homes?
iren [92.7K]
The decade in which the personal computers became commonplace in offices, schools, and some homes were the 1980s. 
8 0
3 years ago
What is the function of the Enter key
spin [16.1K]

The enter key sends the cursor to the next line, or it executes a command or operation.

4 0
3 years ago
Other questions:
  • Aaron has elaborate systems set up on his computer to remind him of all the things he has to do and when he has to do them. The
    12·1 answer
  • If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
    15·1 answer
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • 2. What does the "Users" metric measure?
    10·1 answer
  • You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
    9·1 answer
  • An oligopoly is a unique market structure. Which of the following is NOT necessary to have a oligopolistic market structure?
    10·1 answer
  • Why does the randomNumber function only use whole numbers between 0 and 1 (basically, 0 and 1)?
    13·1 answer
  • window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
    15·1 answer
  • Which of the following are pointers?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!