1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
13

Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh

at study does she describe to back up this idea of women needing more confidence ?
Computers and Technology
1 answer:
Sedbober [7]3 years ago
5 0

Answer:

have a nice day! ❤❤

Explanation:

You might be interested in
Using a conversation voice is part of:
MaRussiya [10]
Need more information
4 0
3 years ago
What is the problem with assigning a port number to more than one server application?
Ilya [14]
Only one daemon (server application) can bind to a port. The second one will fail.
3 0
4 years ago
Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
docker41 [41]

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

6 0
3 years ago
In designing a database, a database administrator should consider..
AfilCa [17]
He must consider all of these because the database is the foundation and you Will come to a lot of problems later on in the road if the foundation is faulty
8 0
2 years ago
Read 2 more answers
Match the following:
Bogdan [553]

Answer:

  1. Operating System.
  2. Laptop.
  3. Convertible computer.
  4. Peripheral.
  5. Desktop Computer.

Explanation:

Operating system is a software that manages the hardware and the software in the system and provides the interface between machine and the user.

Laptops are the portable computing devices which you can carry with you.

Convertible computer have a keyboard that is detachable and can be converted into a tablet.

Peripherals are devices which we can attach to the computer.

Desktop computer is a computing device that not portable at all.

3 0
3 years ago
Other questions:
  • What is the difference between First Person Shooters and Construction Simulations?
    12·2 answers
  • Having a good credit score is important because:
    7·1 answer
  • What can a parent do to help a child adjust to a new culture or area
    7·2 answers
  • Define and test a function myRange. This function should behave like Python’s standard range function, with the required and opt
    11·2 answers
  • TCP will guarantee that your packets will arrive at the destination, as long as the connection is still established. True False
    11·1 answer
  • ________ are found on the motherboard and are used to attach your hard disk.
    6·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • Accessing a computer system by using several words is known as​
    13·2 answers
  • Why is 0.3333333333333333 the output of print(1/6 + 1/6) in python?
    8·1 answer
  • When you ____ an exception, you send a message that an error has occurred to another part of the program.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!