1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
10

Why is it important to know the skills, experience needed and pay for a potential career choice?

Computers and Technology
1 answer:
Musya8 [376]3 years ago
7 0
You want to know what you’re future might look out to be (labor, money, health, spirit)
You might be interested in
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
Use______ to format cells when they meet a certain criteria.
olchik [2.2K]
Data Calculations

Good luck
7 0
3 years ago
John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
Romashka-Z-Leto [24]

Answer:

Hardware.

Explanation:

John is operating with Internal Computer Professionals, an organization committed to assisting sector owners to overcome MIS technology problems. John's duties include maintaining and repairing motherboards, wires, and parts of inner devices including DVDs and hard disks. Although John's appointed for hardware fixation.

3 0
3 years ago
What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
FinnZ [79.3K]

Answer:

A transposition is the correct answer.

Explanation:

A transposition is the type of encryption that caused when one side of the unshielded twisted pair cable is finished in the configuration of  T568A and at the other side of the configuration of T568B, it is also termed as error or cipher. So, that's why the following answer is true.

7 0
3 years ago
Which of the following best describes the protocols used on the Internet?
ASHA 777 [7]

Answer:

C: The protocols of the Internet are open and used by all devices connected to the network

Explanation:  Hope this helps.  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

4 0
3 years ago
Other questions:
  • The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
    8·1 answer
  • All network operating systems today use the ____ protocol suite for internet communication.
    14·1 answer
  • Marco is ready to create his first slide. He wants to put the title of the
    11·1 answer
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
    13·1 answer
  • Which feature of a presentation program’s interface provides a list of commands to create, format, and edit presentations?
    14·2 answers
  • There are two kinds of type that you can add to a document in Photoshop. You can add
    13·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Note oj cyber security​
    6·1 answer
  • To break a text string into several lines, which means that the text string continues on the next line, the _____ character shou
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!