1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
5

An entrepreneur identifies and fills the gap between what the society needs and what is available is called​

Computers and Technology
1 answer:
valkas [14]3 years ago
7 0

Explanation:

Therefore, an entrepreneur is an organization builder. 6. Gap-filling function – The gap between human needs and the available products

You might be interested in
Characteristics of successful entrepreneurs include
crimeas [40]
The answer would be A because grit means to fight hard to get what you want. Submission would be to give in to pressure and give up. Self-importance would be to only focus on yourself and no one else. A short attention span would not work out for you because you get distracted easily.
8 0
4 years ago
Which of the following behaviors does not harm a company if your employment is terminated?
saul85 [17]

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

3 0
3 years ago
A firewall, when properly implemented, can prevent most attacks on your system.
Verizon [17]
This is true, A firewall is used to get rid of viruses and attackers and keep them out of your computer. But if not properly implemented can do next to nothing for you.
5 0
4 years ago
Read 2 more answers
Corey set up his presentation for delivery to his team.
N76 [4]

Answer:

If Corey wants to control the pacing of his presentation, he should adjust his playback settings. In the playback settings, he should select the default setting under "type;" this will allow him to change slides anytime. He should also click the check box under "options" that says "Change slides manually" so he can simply click on the slide whenever he is ready to move on to another slide.

Explanation:

If you don't like that answer, here's another one:

Corey knew he would need a lot of time to explain each point and that his team members would have lots of comments and questions. The best way that Corey should set up his slide show would be to make sure that he has an outline. Also, there should only be one thought per slide (never mix it). It has to be taken into account that he should have fewer words and more images/graphs.

6 0
3 years ago
01001110 01100101 01110110 01100101 01110010 00100000 01100111 01101111 01101110 01101110 01100001 00100000 01100111 01101001 01
Scorpion4ik [409]

The Binary code translation are: Never gonna give you up\nNever gonna let you down\nNever gonna run around and desert you\nNever gonna make you cry\nNever gonna say goodbye\nNever gonna tell a lie and hurt you\n.

<h3>Binary code translation</h3>

Binary code can be defined as machine language which a computer understand.

This binary code are often used in digital computer and the  data code  mostly use are zero (0) and one (1) and  they help to represent information.

Therefore the Binary code translation are: Never gonna give you up\nNever gonna let you down etc.

Learn more about binary code here:brainly.com/question/9480337

#SPJ1

7 0
2 years ago
Other questions:
  • friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
    11·1 answer
  • When registering a new domain name, either the registrar's servers or self-owned servers can be used as name servers. What funct
    15·1 answer
  • Which question best helps a reader understand a plot’s exposition? What will life be like after the character takes action? How
    14·2 answers
  • What file holds the preferences and settings of the currently signed-in user??
    9·1 answer
  • Alisha's teacher usually includes lots of comments on student tests to help them understand why their answers were
    8·2 answers
  • Your teacher needs to keep track of a biology experiment's results for all students, to
    7·2 answers
  • State differences between title bar and menu bar​
    5·1 answer
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    5·1 answer
  • Need answer ASAP
    14·1 answer
  • The physical parts of a computer are called application software.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!