1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
13

Which type of data table can predict projected growth using both projected increases in sales and expenses?

Computers and Technology
2 answers:
Doss [256]3 years ago
4 0

Answer:

D

Explanation:

Tasya [4]3 years ago
3 0

Answer:

D) A two-variable data table

Explanation:

sales is one variable, data is a second = Two variable table

You might be interested in
What is the impact of information technology in your daily life?
yawa3891 [41]
Technology affects people's lives differently.
Some are bad and some are good.
But for me, technology gives us a chance to collaborate and connect even if we are miles away.
People are opening their mind to new kind of knowledge that can help us improve and grow.
3 0
3 years ago
Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
Rzqust [24]

in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.

6 0
2 years ago
With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
kirza4 [7]

Answer:

Phishing

Explanation:

Phishing is a social engineering attack where users are asked to respond to an email or are directed to a website where they are requested to login with their personal credentials, such as passwords or credit card numbers.

How Phishing Works?

The attacker first carefully designs a web page identical to a real bank with fine details. Then attacker persuades the victim to go to this fake web page with login screen. The attacker gets all the information typed and enter into that fake web page. The victim often thinks that this is exactly my bank's web page so nothing is going to happen if I put log in credentials.

How to avoid Phishing?

This kind of attack can always be spotted with one simple trick. Check the address of the web page carefully. The attacker can design the web page according to his wish but he cannot have control over the web address of a real bank or real a website.  

Some general safety tips are:

  • Don't open links from spam emails.
  • Don't download malicious software.
  • Don't share personal information with strangers
7 0
4 years ago
​ In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review
andreev551 [17]

Answer:

design walk-through

Explanation:

In addition to analyzing logic and program code, a project team usually holds a session with users, called a <u>design walk-through</u>, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.

A design walk-through is a quality practice that allows designers to obtain an early validation of design decisions related to the development and treatment of content, design of the graphical user interface, and the elements of product functionality.

8 0
4 years ago
Write a paragraph about ICT in personal life?
melisa1 [442]

Answer:

Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual systems, that enable users to access, store, transmit, and manipulate information.

6 0
3 years ago
Other questions:
  • Name the component used in first generation of computer​
    10·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • How to Create a while loop
    6·2 answers
  • What outline feature can the Navigation pane browse the document by?
    14·2 answers
  • An internet connection is required to access which type of software?
    5·1 answer
  • Light is a key formal element that film artists and technicians carefully manipulate to create mood, reveal character, and conve
    15·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    9·1 answer
  • A student can improve performance by decreasing
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!