1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
14

Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which co

mmand group will he use will he use
Computers and Technology
2 answers:
Mars2501 [29]3 years ago
3 0

Answer:

refine

Explanation:

Artyom0805 [142]3 years ago
3 0

Answer:

I took the unit test it is Refine/C

Explanation:

You might be interested in
1.1. (30 points) Write a program to calculate the average number of cars sold by a car agency over a period of years for the fir
mario62 [17]

Answer:

count = 0

months = 0

years = int(input("Enter the number of years: "))

for year in range(1, years+1):

   cars_sold = int(input("Enter the number of cars sold in first six months: "))

   count += cars_sold

   months += 6

print("Number of months: " + str(months))

print("Number of cars sold in total: " + str(count))

print("Average number of cars sold per month: " + str(count / months))

Explanation:

Initialize the variables

Ask the user for the number of years

Create a for loop that iterates depending on the given number of years

Ask the user for the number of cars sold in the first six months of the year

Increment the count by given number and increment the months by 6 after each iteration

Print the months, count and, average

8 0
3 years ago
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
3 years ago
List one way to convey professionalism to the reader of a document.
Ray Of Light [21]
Abstain from contractions like “couldn’t” or “should’ve” and use “could not” or “should have” instead
4 0
3 years ago
Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
Olin [163]

Answer:

technical feasibility

Explanation:

This is the process of validating the technology assumptions, architecture and design of a product or project. A technical feasibility study shows the details of how you intend to deliver a product or service to customers. Puts into consideration the following :

materials, labor, transportation, where your business will be located, and the technology that will be necessary to bring all this together.

3 0
3 years ago
Which particle of the atom has a positive charge? A. proton B. electron C. nucleus D. neutron Question Resources
Fittoniya [83]
Proton has a positive charge.
5 0
4 years ago
Read 2 more answers
Other questions:
  • Really need help with these PLZ
    6·1 answer
  • The fourth generation of computers was marked by the introduction of ____.
    11·1 answer
  • What does nat stand for? network access trigger network administration timetable network address translation network association
    13·1 answer
  • Can anyone drink and drive safely?
    13·2 answers
  • Write a program to read a record from a binary file
    8·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
  • Which model represents any process in general?
    6·1 answer
  • Why are laptop employment of computer popular these days​
    5·1 answer
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
  • what is the system that connects application repositories, systems, and it environments in a way that allows access and exchange
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!