1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
5

An entrepreneur identifies and fills the gap between what the society needs and what is available is called​

Computers and Technology
1 answer:
valkas [14]3 years ago
7 0

Explanation:

Therefore, an entrepreneur is an organization builder. 6. Gap-filling function – The gap between human needs and the available products

You might be interested in
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
3 years ago
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Which of the following is not a primary environment in Autodesk Inventor? A. Parts B. Assemblies C. Animations D. Presentations
UNO [17]

I want to say it's C. Animations.

I hope this helps!

7 0
3 years ago
Ning wants to gather data about humidity for a science project. Which of these are needed to gather data?
IgorLugansk [536]

Answer:

A -  information

Explanation:

in the question it says Ning wants to GATHER DATA for the project so, he need information.

IF im wrong, plz tell me and sry if i am

8 0
3 years ago
Read 2 more answers
when you select cells in your worksheet and then click the copy button, what happens? select one: a. the formatting is removed f
Amiraneli [1.4K]
Hey there! Hello!

Not sure if you still need this answer, but I'd love to help out if you do.

In terms if Excel Spreadsheet, your answer will be D. A<span> moving dashed line border appears around the cells. What the copy button does is take the contents in your cell(s) and copies them so that you can paste them elsewhere. B and C would apply here if you were cutting the text, which clears whatever you have selected so that you can paste them elsewhere without having to go back and delete it. 

I have attached an example of what happens to a cell when you either right click it and press copy, or press ctrl/command+c, which is the keyboard shortcut for copying text or contents. 

Hope this helped you out! Feel free to ask me any additional questions if you have any. :-)</span>

4 0
3 years ago
Other questions:
  • ACCOUNTING
    13·2 answers
  • Which of the statements below is false? Question 19 options: a) You can install a 64-bit operating system on a 64-bit machine. b
    12·1 answer
  • There is a simple pattern for determining if a binary number is odd. What is it and why does this pattern occur
    6·2 answers
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    7·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • What is the analysis stage in System development life cycle?
    12·1 answer
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • Examples of domain names and usernames<br><br><br><br>​
    11·1 answer
  • Pleaseeeeeeee tellllllllllllllllllllll​
    8·1 answer
  • 3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!