1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
2 years ago
13

What is not an example of a job skill

Computers and Technology
2 answers:
ikadub [295]2 years ago
8 0

Being dishonest, irresponsible and unpunctual.Answer:

Explanation:

sdas [7]2 years ago
5 0
Dishonesty, irresponsible, bad behavior
You might be interested in
Round-robin schedulers normally maintain a list of all runnable processes, with each process occurring exactly once in the list.
Cloud [144]

Answer:

A process will get more quanta per scheduling cycles. This is used to give more important process a larger share of the CPU.

Explanation:

6 0
3 years ago
When it comes to credit scores, why is having a
inessss [21]

Answer:

credit karma

Explanation:

karma is -69

6 0
3 years ago
A(n) _______________ loop usually occurs when the programmer forgets to write code inside the loop that makes the test condition
Serggg [28]
Infinite





,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
5 0
3 years ago
Defensive programming is sometimes referred to as _________.
Romashka [77]
Anti-malware and Anti-Virus
6 0
3 years ago
Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students’ exam scores?
Anna007 [38]

I am not sure but I think that it is either the First option or the Third option but you would probably need more information.

7 0
2 years ago
Read 2 more answers
Other questions:
  • We can see spreadsheet results graphically by creating:
    15·1 answer
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • What is cyberbullying?
    14·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • How many ways do advertisers determine target audiences ??????
    15·1 answer
  • How to deactivate the brainly account?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!