1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
9

Which of the following voice-mail greetings would be best received by potential employers?A."Leave a message. I will think about

calling you back."B."I am not available to take your call right now. Please leave your name, number, and a message and I will return your call."C."Hello. Hello. I can't hear you. Please speak up."D."This is Sam. I can't take your call right now. Leave your info and I will catch you later."
SAT
2 answers:
tino4ka555 [31]3 years ago
8 0

Answer:

d

Explanation: can't explain

nirvana33 [79]3 years ago
7 0
Option B is the correct answer
You might be interested in
How are frequency tables and histograms alike and how are they different
Eva8 [605]

Answer:

In a histogram, you can use the same intervals as you did for the frequency table. The bars in the histogram will have no space between them. The histogram shows the same information as the frequency table does. However, the histogram is a type of graph, meaning that it is visual representation.

Explanation:

pls brainlist

8 0
2 years ago
There is a side of the moon that never gets sunlight. Which statement about this sentence is correct?.
DIA [1.3K]

The sentence is false because all sides of the moon get sunlight in equal portions as the moon rotates.

6 0
2 years ago
saddle inc. has two types of handbags: standard and custom. the controller has decided to use a plantwide overhead rate based on
aleksklad [387]

a. Computation for the overhead rate using the traditional plantwide approach

Plantwide overhead rate = 303,000/145,000

Plantwide overhead rate= 208.97%

(43,000 + 102,000 =145,000)

b. Computation for  the overhead rates using the activity-based casting approach

Machining = 196,000/2,580

Machining= 75.97 per machine hour

Machine setup = 107,000/490

Machine setup = 218.37 per setup

c. Calculation to determine  the difference in allocation between the two approaches.

Overhead allocated :

Traditional  costing

Standard= (43,000×208.97%)

Standard=89,857

Custom=(102,000×208.97%)

Custom=213,149

Activity based costing

Standard= (1,310×75.97)+(110×218.37)

Standard=99,520.7+24,020.7

Standard=123,541

Custom=(1,270×75.97)+(380×218.37)

Custom=96,482+82,981

Custom=179,463

Learn more here:

brainly.com/question/16565524?referrer=searchResults

5 0
2 years ago
The trait of “freckles” is dominant and represented by A. No freckles is recessive and represented by a. A researcher crossed tw
Ivahew [28]

Answer:

It's wrong.

Explanation:

In the Punnett square, we will use F to represent the dominant freckles gene and f to represent the recessive lack-of-freckles gene. The first individual would have FF, because homozygous means that both alleles are the same. The second individual would have Ff, because heterozygous means that it has 2 different alleles. If the first individual passes down one of its "F" alleles and the second individual passes down its "F" allele, the offspring would have 2 dominant alleles, and the researcher's conclusion is disproven.

5 0
3 years ago
Read 2 more answers
A security team is working with a client to evaluate the security of data and it functions that are most critical to the operati
borishaifa [10]

The three (3) security goals that would align and prioritize security efforts to the business goals of an organization are:

1. Confidentiality

2. Integrity

3. Availability

A security goal can be defined as both the short-term and long-term strategic objectives that detects and protects the assets of a business organization from theft or misappropriation by any internal or external party.

This ultimately implies that, it is very important that security goals of a business organization are aligned with its business goals.

Generally, there are three (3) main security goals for all business organizations and these include:

  • <u>Confidentiality:</u> the confidentiality of all data and assets should be well protected.

  • <u>Integrity:</u> the integrity of all data and assets should be preserved.

  • <u>Availability:</u> all data and assets should be provided for authorized use only.

Read more on security goals here: brainly.com/question/25734235

3 0
2 years ago
Other questions:
  • Students in a school-to-work program have the opportunity to participate in all the following except
    14·1 answer
  • Poor depth perception can cause a driver to:
    14·2 answers
  • Joe has a cat that is homozygous for black fur and a cat homozygous for white fur. What would be the genotype(s) of their offspr
    5·2 answers
  • A 24-N net force acts on a 8-kg rock.What is the acceleration of the rock?
    13·2 answers
  • OK GUYS THIS IS EXTREMELY HARD AND I NEED HELP <br> PLEASE HELP ME AND DONT STEAL MY POINTS
    14·1 answer
  • anna bought 2 3 5 lb of grapes and sanika bought 1 2 lb less than anna. how many pounds of grapes did they buy in all?
    15·1 answer
  • In interval estimation, the t distribution is applicable only when
    6·1 answer
  • Which table of values was used to create the scatterplot below?.
    11·1 answer
  • Carlene is saving her money to buy a $500 desk. She deposits $400 into an account with an annual interest rate of 6% compounded
    5·1 answer
  • A market segment is ______ if marketers can reach members of the segment with customized marketing mixes.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!