1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
2 years ago
12

Keeping memos on your checks is important because they

Computers and Technology
1 answer:
Anastasy [175]2 years ago
8 0

Answer: they can determine how you get paid, so if you get a memo about schedules, and you work hourly, you keep keep that memo to show that you are following direction in hours, which result in getting paid more/less.

You might be interested in
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
ludmilkaskok [199]

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

8 0
3 years ago
Choose the correct vocabulary term from each drop-down menu
Korvikt [17]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Education that focuses on skills that can be used in the workplace is work-based learning.

Creating curriculum around learning goals established by the training or learning department is formal learning.

The continued pursuit of knowledge for either personal or professional reasons is lifelong learning.

Learning that focuses on goals established by the learner is informal learning.

7 0
2 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
What type of software is word processing software?<br><br> (I really need the answer )
sergejj [24]

Answer:

Application software

Explanation:

There are two types of software: application software and systems software. Systems software focuses on managing the computer itself, like file managing applications, DOS, etc. Application software is for the users of the device. Examples include a media broadcaster, like Netflix, a video game, email services, and of course, word processor.

If you're looking for examples of word processing software, these include Microsoft Word, Google Docs, Pages, etc.

6 0
2 years ago
A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is curr
SIZIF [17.4K]

Complete Question:

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code Segment?

Group of answer choices.

А. A string variable named s and a Boolean variable named a.

B. A string variable named s and a numeric variable named A.

С. A string Variable named studentName and a Boolean variable named isAbsent.

D. A string Variable named studentName and a numeric variable named absences.

Answer:

C. A string variable named studentName and a Boolean variable named isAbsent.

Explanation:

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

In this scenario, teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent.

Hence, the variables which are most appropriate for the code segment are a string variable named studentName and a Boolean variable named isAbsent.

Basically, the string variable named studentName would only accept or hold values that are alphabetic but not numerical value. Thus, the variable studentName would represent the name of a specific student.

Also, the Boolean variable named isAbsent would accept values that are either "True" or "False" because it works on the principle of Boolean logic (0 for false and 1 for true).

4 0
2 years ago
Other questions:
  • Explain the term computer output​
    8·1 answer
  • What is the name of a robot astronaut created by NASA
    14·2 answers
  • A(n ____ with a drop down menu provides consistency in function and appearance making it easy for users to learn and work with t
    7·1 answer
  • 6. Which hypothesis about the fate of the universe says that it will expand continuously as the galaxies drift far apart and all
    7·1 answer
  • If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
    9·2 answers
  • What was the attitude of the U.S. Senate towards the Treaty of Versailles, and why did they have that attitude?​
    9·1 answer
  • Social media is a type of ___________ ccommunication (type either push or pull for your response).
    8·2 answers
  • I have been working on this python program for a hour now, and I am trying to figure out what I an doing wrong in the loop. I ha
    5·1 answer
  • Please help I will mark brainliest
    11·2 answers
  • Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!