1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
13

How do entrepreneurs traditionally use computers? check all of the boxes that apply.​

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
7 0

Answer:

Explanation: make sure you have it right

Rudiy273 years ago
6 0

Answer:

to manage financial records

to e-mail clients

to communicate with clients on social networking sites

to catalog tax records

Explanation:

These are the options;

apply.

to manage financial records

to create advertisements

to communicate with clients on social networking sites

to catalog tax records

to e-mail clients

to complete taxes automatically

to create invoice

A computer which is a machine that make use of instructions to carry out operation in a arithmetic or logical ways through computer programming. Computer is of many help to business today because it can carry out many tasks.Entrepreneurs can traditionally use computers in different ways such as in;

✓ management of financial records

✓e-mailing of clients

✓ communicating with clients on social networking sites

✓ cataloging tax records

You might be interested in
Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
Zina [86]

Answer:

The queue pending requests of FIFO order is ;

86, 1470, 1774, 948, 1509, 1022, 1750, 130.

Explanation:

The FCFS schedule is 143, 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130.

Total seek distance is 7081.

The SSTF schedule is 143, 130, 86, 913, 948, 1022, 1470, 1509, 1750, 1774.

Total seek distance is 1745.

The LOOK schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 130, 86.

Total seek distance is 3319.

The SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 4999, 130, 86.

Total seek distance is 9769.

7 0
3 years ago
010101010101011101011
sattari [20]
Whatwhatwhatwhat???????????
6 0
3 years ago
: Compute the 9 partial derivatives for the network with two inputs, two neurons in
lions [1.4K]

Using the python code we can say that it will be possible to calculate the neutrons and organize them as:

<h3>The code can be written as:</h3>

<em>def get_total_derivative(self,l_id):</em>

<em>def sigmoid(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.exp(-x) / (1. + np.exp(-x))**2.</em>

<em>if div == 2: </em>

<em>return - np.exp(x) * (np.exp(x) - 1) / (1. + np.exp(x))**3.</em>

<em>return 1. / (1. + np.exp(-x)) </em>

<em />

<em>def linear(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.full(x.shape,1)</em>

<em>if div > 2: </em>

<em>return np.zeros(x.shape)</em>

<em>return x </em>

<em />

<em />

<em />

See more about python at brainly.com/question/18502436

#SPJ1

8 0
2 years ago
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
As new technological systems develop, old systems become obsolete.<br><br><br> False<br><br> True
uysha [10]

Answer:

true

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
    13·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Danielle is looking for information on an accounting principle for class. She does not want to sift through a lot of information
    14·1 answer
  • In the code segment below, assume that the int variable n has been properly declared and initialized. The code segment is intend
    5·1 answer
  • Define Turbo C++ and how is the use of Turbo C++.?
    15·1 answer
  • ________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
    14·1 answer
  • One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F
    14·2 answers
  • The operating systems, and utility programs that perform system
    6·1 answer
  • Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the numbers from 1 to 10 with
    13·1 answer
  • What is an advantage of using a dynamic hard drive in a vm?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!