1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
2 years ago
10

Bill has to write a report for this manager. He must do some background research, write the report, and present it to a group of

30 employees. Which factor will likely influence his list of priorities?
a.
Logic
b.
Importance
c.
Achievability
d.
Time


Please select the best answer from the choices provided
Computers and Technology
2 answers:
LenKa [72]2 years ago
4 0

Answer:

A. Logic is the answer

Bill need to write the paper with logic

lozanna [386]2 years ago
3 0

Answer:

Logic

Explanation: Should be right, someone else got it right.

You might be interested in
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired
aleksklad [387]

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

3 0
2 years ago
This is your code.
MAVERICK [17]

Blue

Explanation:

Because the row is 1 and the column in 2.

5 0
3 years ago
Read 2 more answers
I need this ASAP!
Elanso [62]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
Mamont248 [21]

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

3 0
3 years ago
What data types would you use to represent following data items:
SVETLANKA909090 [29]
1. I have no clue
2. I have no clue
3. I have no clue
6 0
2 years ago
Other questions:
  • Write a C++ program that manage the student’s grades. Starting with a fixed number of students (use 10 for simplicity) the user
    10·1 answer
  • Why don’t we need to know the IP addresses for our favorite sites
    11·2 answers
  • There are only about_____major language branches throughout the world
    11·1 answer
  • I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault
    12·1 answer
  • Which of the following is not a commonly found online dictionary?
    7·2 answers
  • How has technology effected the way we communicate?
    5·1 answer
  • Create a class called Circle, which has (i) an attribute radius, (ii) a method that returns the current radius of a circle objec
    6·1 answer
  • How many string object are in 128,55 in python
    7·2 answers
  • This project must target a Unix platform and execute properly on our CS1 server.
    9·1 answer
  • Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!