answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
2 years ago
10

Escribe, en los siguientes cuadros, los conceptos que correspondan

Computers and Technology
1 answer:
Fofino [41]2 years ago
3 0

Answer:

Débito o debe                                                         Crédito o haber

Préstamo de la cooperativa                                          Efectivo

Gasto de arriendo                                              Cuentas por cobrar

Cuentas por pagar                                          Documentos por cobrar

Gasto de publicidad                                                Capital social

Hipoteca por pagar                                                       Ventas

Intereses pagados            Bancos (en el caso de cobros a través de bancos)

Bancos (en el caso que deba productos bancarios)

Explanation:

You might be interested in
Deanna wants to have an exciting presentation and adds animations. She wants her bullet points to be animated through motion. Wh
aivan3 [116]
Fade in is the correct answer
3 0
2 years ago
Read 2 more answers
Given an n-element array X, algorithm D calls algorithm E on each element X[i]. Algorithm E runs in O(i) time when it is called
krek1111 [17]

Answer:

O(n^2)

Explanation:

The number of elements in the array X is proportional to the algorithm E runs time:

For one element (i=1) -> O(1)

For two elements (i=2) -> O(2)

.

.

.

For n elements (i=n) -> O(n)

If the array has n elements the algorithm D will call the algorithm E n times, so we have a maximum time of n times n, therefore the worst-case running time of D is O(n^2)  

5 0
2 years ago
When you examine a computer chip under a microscope, what will you see?
ELEN [110]
<span>When you examine a computer chip under a microscope,  you will see </span>integrated circuits.
5 0
2 years ago
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
2 years ago
Robin wants her presentation to move from one slide to another with special motion effects. Which option should Robin use?
topjm [15]
If this is in power point, then she should use the <em>transitions </em>tab on the ribbon. =)
3 0
2 years ago
Read 2 more answers
Other questions:
  • If you have long column labels with columns so wide that they affect the readability of a worksheet, you should first
    7·1 answer
  • The alternative to encapsulating security protocol (esp) is _________.
    10·1 answer
  • The ________ method is based on simple arithmetic. The process involves dividing the bits of a frame into equal segments, adding
    11·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
    8·1 answer
  • A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a compute
    7·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    13·1 answer
  • Sensors and devices connected to a model are examples of which of the following?
    6·2 answers
  • Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of words in
    10·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!