1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
14

Can i eat chicken and you shut

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
5 0

What- (つ._. )つ .................

scoray [572]3 years ago
3 0

Answer:

ofcccc whenn ?

You might be interested in
If a work is in the public domain… Group of answer choices its copyright has expired. it may not be used for commercial purposes
ArbitrLikvidat [17]

Answer:

its copyright has expired

Explanation:

If a work is in the public domain it means that it's copyrighte has been expired.

After the period of copyright protection has expired, a work becomes available for use without permission from the copyright owner; it is now said to be  "in the public domain." Most works enter the public domain because their copyrights have expired.

3 0
2 years ago
According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
Kitty [74]

Answer:

The correct answer is letter "A": commit with fallback.

Explanation:

American Professor Alfred A. Marcus (born 1950) in his book "<em>The Future of Technology Management and the Business</em>" (2015) describes that hedging may be a strategy to shield businesses from the rapidly evolving world they face as a result of the continuous implementation of technology in the market. According to Marcus, there are 5 hedge approaches that firms should implement:

  1. Gamble on the most probable:<em> work on the product with the highest success rate. </em>
  2. Take the robust route: <em>invest in as many products as possible. </em>
  3. Delay until further clarity emerges:<em> waiting for a proper moment to react in front of market changes. </em>
  4. <u>Commit with a fallback</u>:<em> adapt according to the market. </em>
  5. Try to shape the future:<em> innovate.</em>
7 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
When an important file is saved on two different computers, what is the name of the file that is housed on the second computer?
OleMash [197]
When an important file is saved on two different computers, the name of the file that is housed on the second computer is 'back up'. Back up refers to the process of copying and archiving a particular computer data in order to have an extra copy to fall back on in the event of data loss.  <span />
5 0
3 years ago
Why is it unlikely that you will find the ip address 192.168.250.10 on the internet?
gayaneshka [121]
That IP address is either Internal, private or reserved
5 0
3 years ago
Other questions:
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • Can you block someone on Brainly?
    7·2 answers
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter
    10·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Using C, Write a program that reads a series of strings from standard input and prints only those strings beginning with the let
    8·1 answer
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
  • Choose all items that represent examples of good website accessibility.
    8·2 answers
  • How to clear a function in functional component react.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!