1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
9

87. Labor Department surveys show a close relationship between job security and

Computers and Technology
1 answer:
faust18 [17]3 years ago
8 0

Answer: office

Explanation:

When there is job, there is security with security,you need an office

You might be interested in
Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about
777dan777 [17]

Answer:THE ANSWER IS A.

Explanation:I DID IT AND I GOT 100

6 0
3 years ago
How to assign some object key values to other name react const.
notsponge [240]

Props are an ordinary object of React that follow the immutable properties. This simply means that you cannot change their value throughout the component. Props and states are in the form of an object which contains the number of key value pairs that could be used to render the value of the objects

8 0
2 years ago
Many who move to business-oriented information security were formerly__________ who were often involved in national security or
kirill [66]

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

5 0
2 years ago
When using Internet explore what options will empty the log of Internet sites you have recently viewed
alexira [117]
I think it’s clear history
7 0
3 years ago
Pls answer thank you​
Sav [38]

Answer:

That would be your opinion

5 0
2 years ago
Other questions:
  • I just want to ask if some one know an online school program that offer a live session and the cost of it not to expensive. for
    10·1 answer
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?
    6·1 answer
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
    13·1 answer
  • Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
    10·1 answer
  • What is the data type of the following expression?
    12·2 answers
  • What steps can be used to password-protect a worksheet?
    14·1 answer
  • I'm surprised I haven't even got a single warning yet lol
    8·1 answer
  • An aggregate function is _____. A. a function that calculates a statistic such as a subtotal or average B. a mathematical expres
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!