1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
2 years ago
6

Why do we buy new asset​

Computers and Technology
1 answer:
Shalnov [3]2 years ago
3 0

Your question is too vauge, what do you mean exactly in what terms because you aimed this to to computer and technology, In business terms asset is something that brings in money or brings a positive impact. A form of asset can be stocks, crypto, NFTs, real estate... If you own one of these you own an asset, its as simple as that.

You might be interested in
Classes cannot:
dexar [7]

Classes cannot Initialize data members in the class definition.

B) Initialize data members in the class definition

<u>Explanation:</u>

Class is defined by end user data type where it can handle multiple data type and referred to other classes also. Class is also called as data structure object or object class.

Due to class methods total programming language coding style is changes. For example employee of an organization should hold his or her employee number, address detail, spouse details, salary details

Where in old style programming language we need to declare separate variable to hold the data types, where we can define employee as class which can hold employee number, address fields, and again define salary details as other class and add employee->employee number where key connect between to class which is called derived class.

5 0
3 years ago
3.
gulaghasi [49]

Explanation:

the process of displaying the information from the table is called query

<h2>hey friend </h2><h2>your answer is here </h2><h2>I hope it will be helpful you </h2><h2>please mark as brainiest answer </h2><h2>thank you </h2>
7 0
3 years ago
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.
sergeinik [125]

Answer:

C

Explanation:

Putting all government forms on the city web site is the least activity likely to be effective in the purpose of reducing digital divide.

Holding basic computer classes at the community centers will very much help to reduce the digital divide.

Providing free wireless internet connections at locations in low-income neighborhood will also reduce the gap of digital divide

Requiring that every city school has computers that meet a minimum hardware and software will made computing resources available to users thereby reducing digital divide.

5 0
3 years ago
Which of the following includes premium content you must pay to use?<br> On word
kotykmax [81]

Some premium contents on Microsoft Word that you must pay before using them include:

  • 1 TB of OneDrive cloud storage
  • Advanced security
  • Expanded technical support
  • Premium templates, among others.

<h3>What are Premium Contents or Features?</h3>

Premium contents or features are exclusive features that have higher quality when compared to the usual quality. In an application like Microsoft Word, there are premium contents or features that can only be used or made available when you subscribe.

Some premium contents on Microsoft Word that you must pay before using them include:

  • 1 TB of OneDrive cloud storage
  • Advanced security
  • Expanded technical support
  • Premium templates, among others.

Learn more about premium contents on:

brainly.com/question/24749457

5 0
2 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • Which mistakes are NOT highlighted by the spell checker in a word-processing document?
    15·2 answers
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?
    15·1 answer
  • Candice’s first job was at the grocery store making deli food. While in culinary school, she worked part time in a restaurant ki
    12·2 answers
  • What are the advantages of customer relationship managment​
    10·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
  • Pro and Cons of Artificial Intelligence in Art <br><br> You must have 3 statements in each
    14·1 answer
  • Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!