1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
6

What is mean by sole trading concern?​

Computers and Technology
1 answer:
DENIUS [597]3 years ago
6 0

Answer:

trading as a whole

Explanation:

pls give brainlest almost lvled up.

You might be interested in
If Asa changes the text to bold, he has changed the style. True False
LiRa [457]
True because if you were to bold a text, you have presented that the following text is more important or exemplified. 
4 0
4 years ago
Read 2 more answers
James is an intern in a film production company. On his first day, James’ boss, Monica, tells him, “Before anything else, let me
bija089 [108]

Answer:

cinematography is the answer broodaaa

6 0
3 years ago
To process the elements in an array, the counter in a for loop is commonly used as the ________________ of the array. -g
kobusy [5.1K]
Index




----------------------------------
8 0
3 years ago
What department is cyber security
Paul [167]

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

8 0
3 years ago
Read 2 more answers
Arrays are commonly used to store data items. Arrays can be managed in ways that fill, iterate over, add to, and delete items fr
vfiekz [6]

Answer:

mark me brainlist

Explanation:

3 0
3 years ago
Other questions:
  • (A) writer or word <br> (B) Calc or Excel <br> (C) impress or PowerPoint<br> (D) none of these
    14·1 answer
  • The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
    6·1 answer
  • A cost-benefit analysis is intended to increase the likelihood that a support analyst has considered the major advantages and di
    5·1 answer
  • Access control lists (ACLs) are used to permit and deny traffic in an IP router.
    14·1 answer
  • In cell E12, enter a formula to calculate the % of Budget by dividing the Actual expense by the Budget expense to indicate the p
    9·1 answer
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • The term _____________ refers to software license agreements that are included within a box of physical-media software.
    9·1 answer
  • Complete the procedure for creating a new appointment by selecting the correct answers from the drop-down menus.
    11·1 answer
  • What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and va
    12·1 answer
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!