1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
14

How to make a business plan​

Computers and Technology
1 answer:
Alborosie3 years ago
8 0

Answer:

Traditional business plan format

Executive summary. Briefly tell your reader what your company is and why it will be successful. ...

Company description. ...

Market analysis. ...

Organization and management. ...

Service or product line. ...

Marketing and sales. ...

Funding request. ...

Financial projections.

Explanation:

Hope it helps

You might be interested in
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
choli [55]

Answer: D) Do an extensive web search to learn if it is a real virus.

Logical explanation: In the example, it is not a pop-up that you have a virus and instead an email that you have a virus. There is a very likely way that it could be a prank, scam, or a hacker.

Elimination explanation: If we look at all the answers:

A (Forward it to everyone in your address book) makes no sense, so A is eliminated.

Then with B (Forward it to your tech administrator) makes sense because if it was a real virus they may know what to do, but as my 'Logical explanation' explains, it may not be.

Finally with C, it's very irresponsible and should not be done. If it was a real virus there is a possibility it could be someone trying to steal information and more.

This leaves only option D left. :)

<h2><u>If this helped at all (or not), please remember to rate, thank, and mark brainliest as seen fit. Have a great day and stay safe! :)</u></h2>
4 0
3 years ago
Explain what the loop does and what the result of executing it will be.
Studentka2010 [4]

Answer:

The loop increments the value of new while the loop condition is true

The end value of new is 3

Explanation:

Given

The above code segment

Required

What the loop does and the result

We have:

new = 0 --- initialize new to 0

i = 3; i \le 5; i++ --- The loop condition;

i.e. the loop will be repeated 3 times (when i = 3, 4 and 5)

new = new + 1 --- For each increment of i, new is incremented by 1

So, the value of new is:

<em>i = 3: new = 0 + 1 = 1</em>

<em>i = 4: new = 1 + 1 = 2</em>

<em>i = 5: new = 2 + 1 = 3</em>

5 0
3 years ago
Suppose company A wants to develop a program that duplicates the functionality of a programm by company B. Describe how company
kompoz [17]
The design of the software is covered by copy right unless it is open sourced or is a very common interface. They would need to come up with their own design and way of solving the problem to have a solution that was not copyrighted.
5 0
4 years ago
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network
devlian [24]

Answer:

127.0.0.1

Network 127.0. 0.0 is reserved for IP traffic local to your host. Usually, address 127.0. 0.1 will be assigned to a special interface on your host, the loopback interface, which acts like a closed circuit.

Hope this can help you!

4 0
3 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Which of the following represents the bus topology? Multiple Choice All devices are connected to a central device, called a hub.
    8·1 answer
  • You have begun a new project and want to keep all of the work you're doing on the project in its own directory. You will create
    8·2 answers
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • Can anyone help with this graded assignment for computer fundamentals
    10·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • We will cover email use and management. Training topics include:
    5·1 answer
  • Try to figure out who the ideal customer is for the IPhone X
    15·2 answers
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • Write the Java code to simulate an inventory control system and a point of sale system with customer history On program start, e
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!