1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
5

I need help ASAP please and thank you!

Computers and Technology
1 answer:
nalin [4]3 years ago
7 0

Answer:

Best: 1 or 4

Worst: 3

Explanation:

I'm not sure if number one is imply to ask your coworker to explain it or actually help with the workload. I think 4 would be the right answer because that is what they are there for and you don't want to distract your coworkers.

You might be interested in
Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
natali 33 [55]

Answer:

Select the function of keypunches that were used as one of the earliest input devices.(1 point) -It was used for punching holes in the paper at relevant ...

Explanation:

3 0
2 years ago
Most software packages have functions for generating _____ about columns of data, which include statistical summaries like contr
GrogVix [38]

Answer:

Descriptives is the correct answer of this question.

Explanation:

Some software packages provide data column definitions that include qualitative summaries such as control averages, mean, average, minimum, standard deviation, number of zero values, number of empty records, etc.

  • A  descriptives summary is a sentence that gives someone information or something.
  • Description is the style of narration creation aimed at making a location, an event, a character or a community vivid.

There are 2 types of Descriptives :-

  1. Narrative type.
  2. Argumentative type.

3 0
3 years ago
A_______VPN connection is a private network that uses a public
goldfiish [28.3K]

Answer:

letter c. point to site po sagot diyan

3 0
2 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
3 years ago
Read 2 more answers
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Other questions:
  • Explain the third <br> generation
    6·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • Rule number one for handling an emergency is to _____. A. buy a new vehicle B. call law enforcement C. remain calm D. restart th
    6·2 answers
  • Positive use of the technology before the pandemic.
    8·1 answer
  • Which visual aids can be used to present large amounts of numerical data from multiple sources? Check all that apply.
    7·1 answer
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • Sustainable development is a goal towards which all human societies need to be moving. elaborate the statement in about 120 word
    9·1 answer
  • Jonah wants to type an assignment using Word. Arrange the steps he needs to follow in the correct order.?
    13·1 answer
  • Catherine, a web designer, has created new content for a client's website. In order to update the company website, she needs to
    15·1 answer
  • In what document does the program manager (pm) address the demilitarization and disposal requirements?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!