1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
12

Create an objective for a resume

Computers and Technology
2 answers:
trasher [3.6K]3 years ago
3 0
To show and represent yourself and your qualities and achievements throughout your life.
LenKa [72]3 years ago
3 0

Your name: Shelbie Stanley

Achievements( Things you are good at):

*Drawing- With pencil and nothing fancy sometimes adult coloring books i like a challenge.

* Singing- Nothing really a lot of people know ,but i was told i have a very soothing voice.

*Writing- Like poems and notes or letters to someone

References (people you have worked for or people that have will get you good word)

You might be interested in
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
Which solution eliminates the need for dedicated high-speed WAN connections between sites
s344n2d4d5 [400]

Answer:

running in the 90 s intensifies

Explanation:

4 0
3 years ago
What does the abbreviation gps mean?
MissTica
GPS stands for Global Positioning System
5 0
3 years ago
Read 2 more answers
How to do 2. Pleaser
V125BC [204]

Answer:

GOD HAS FORSAKEN YOU NOW PRAISE DHAR MANN

6 0
3 years ago
A ____ resembles a circle of computers that communicate with each other.
Sidana [21]

Answer:

ring network

Explanation:

In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.

In comparison,

- in a star network every communication needs to pass through a central hub node

- in a bus, each node is connected to a shared linear communication bus.

- in a hierarchical network nodes are organized along a tree structure layout.

4 0
3 years ago
Other questions:
  • Assume that an int variable age has been given a value. Assume further that the user has just been presented with the following
    14·1 answer
  • When you sort a cell range using a to z or z to a, what is rearranged?
    5·1 answer
  • What is a browser? Give one example
    8·2 answers
  • Sorting and filtering are two ways to _____ data.
    7·2 answers
  • Which is an example of static web page??
    9·2 answers
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • If your database is in archivelog mode, how can you force an archive?
    7·1 answer
  • Gold jewellery is made when solid-gold is melted and then put into containers which are the shape of the jewellery. After this t
    9·1 answer
  • Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei
    12·1 answer
  • What the difference between an operating system drive and a storage drive?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!