1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
2 years ago
5

The impact of the destruction of train station on the budget of the minister of finance

Computers and Technology
1 answer:
zhuklara [117]2 years ago
7 0

The impact of the destruction of train station on the budget of the minister of finance is said to be very huge.

<h3>How do railways destruction affect the economy?</h3>

When there is railroads destruction, a lot of money such as billions of dollars is been spent to repair the damages and this will be of a great concern to the minister of finance.

Most countries is run by Budget and when sudden things like this happen, the Minister have to look for other ways to source for funds and this will affect other parts or items on the budget of the Minister.

Learn more about  minister of finance from

brainly.com/question/470781

You might be interested in
The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a
kupik [55]

Answer:

may be it is integration

Explanation:

4 0
3 years ago
2. Create 4 riddleson keywords which is related to fire wall.​
Alona [7]

Answer:

It's been so good to have you as a friend:

2. As sweet and rich as honey-colored sun

3. Slanting steep across a summer lawn,

4. Gilding life with all that love can lend.

5. And now that you yourself have griefs to tend,

6. I want to be the strong and caring one

7. To count to you the lovely things you've done

8. Until these troubles pass and sorrows end.

9. You are so beautiful in form and soul

10. That you bring happiness to all you're near:

11. Just as a sea rose, flowering in mist,

12. Makes a paradise of some bleak shoal,

13. Turning truth to something far more clear,

14. No pain unsoothed or rain-swept cheek unkissed.

good~0~as_a_friend . good_to_have~Slanting~lawn .

It's_been~so_good~as_a_friend .

to_have~griefs_to~form_and_soul

Explanation:

7 0
3 years ago
As a result of 5G networks &amp; edge computing there will be an increasing number of different internet connection
vfiekz [6]

Explanation:

<h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹</u></em></h2><h2 /><h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹IBM provides an autonomous management offering that addresses the scale, variability and rate of change in edge environments. IBM also offers solutions to help communications companies modernize their networks and deliver new services at the edge.</u></em></h2>

Hope this answer is helpful

8 0
3 years ago
A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 t
Leto [7]

Answer:

Internet2

Explanation:

World Wide Web

8 0
3 years ago
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the
arlik [135]

Answer:

The answer is "True".

Explanation:

"Remote Access Trojan" stands for RAT. It is a malware software program with an administrative gateway to control the destination device. Usually, this program is unnoticed by software which the user accesses.

  • This program is used for access to confidential information, such as credit card and social security numbers.
  • It also activates a system's webcam and recording video, that's why the given statement is "True".

7 0
3 years ago
Other questions:
  • The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se
    9·2 answers
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • What is a computer network?
    5·1 answer
  • I need to reverse a inputted word using for loops with range 0 to the input word and increment 1.
    5·1 answer
  • A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the
    10·1 answer
  • Did the Z3 computer invented by Konrad Zuse have a negative effect on society?
    9·2 answers
  • Please answer this question​
    6·1 answer
  • How does microsoft label mac addresses in the windows utilities that show you the mac address?
    13·1 answer
  • Why does my internet keep disconnecting and reconnecting.
    9·1 answer
  • When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!