1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
14

How is a non-disclosure agreement an important tool for businesses?

Computers and Technology
2 answers:
garik1379 [7]3 years ago
5 0

Answer:

d

Explanation:

Sloan [31]3 years ago
4 0

Answer:

D

Explanation:

You might be interested in
which of these is a placeholder in a document into which variable data is inserted during the process of a mail merge?
Margarita [4]

Answer: C. Merge Field.

The Merge Field is a placeholder that holds the variable data that will be inserted into the main document during a mail merge procedure. The columns in a document may represent the categories of information. The Rows represent the records of the different columns. The computer counts a row of data to be a single record.

7 0
3 years ago
Read 2 more answers
What is an optical drive used for?​
solong [7]

Optical Disc Drive (ODD) An optical disc drive (ODD)

for using CDs, DVDs, and Blu-ray discs to listen to music or watch a movie.

Most drives also allow you to write data to a disc, so you can create your own music CDs, video DVDs or even create of back-up copy of your important data files.

dell.com

4 0
2 years ago
Read 2 more answers
Which of the following is the best way to make sure you understand what someone has said?
aivan3 [116]

Answer:

I would choose either paraphrase the info or take notes.

Explanation:

8 0
3 years ago
Read 2 more answers
Where would you go to add fractions to a document in adobe indesign
prisoha [69]

Just select the fraction text and choose Open Type > Fractions from the Character panel menu.

5 0
3 years ago
Look at comments and read it please.
Brilliant_brown [7]

Answer: I need a point bruhhh

Explanation:

3 0
3 years ago
Other questions:
  • Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
    10·1 answer
  • In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.
    9·1 answer
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • Does artificial intelligence have a place in our society why or why not
    5·2 answers
  • Rey is recording the dialogues and sound effects separately in the studio, as he is not happy with the sound quality recorded on
    9·1 answer
  • The "c" key and the "e" key are struck by
    12·2 answers
  • Hello hello . please help me​
    8·2 answers
  • Which of the following is true of equilibrium? *
    9·1 answer
  • Who knows my sister better?
    15·2 answers
  • A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!