answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
2 years ago
5

List 5 kinds of acquaintances who told Debbie Fields would fail? right answer only

Computers and Technology
2 answers:
Mamont248 [21]2 years ago
3 0
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
FinnZ [79.3K]2 years ago
3 0

Mrs. Fields' Original Cookies, Inc. has expanded from one store which was started in 1977, to over 1,500 stores. This is a true story of an American homemaker who overcame major hurdles to create an international business. Having acquired a skill when she was a little girl, Debbi Fields decided to start a business. However, everybody said she would fail.

Her husband’s business acquaintances enjoyed her cookies but were the first ones to advise her that it would be a “bad idea” and that it would never work. Her husband went along with Debbi’s idea, but deep down, he did not believe in her dreams. Debbi pressed on and went ahead to borrow a bank loan. Their banker trusted the young couple to pay back their borrowed loan, even though he expected the business to fail as well. Debbi’s friends and her fellow college students , her own mother, and her in-laws said she would fail.

You might be interested in
4.2 Code Practice: Question 2
skad [1K]

I've included my code in the picture below. Best of luck.

5 0
2 years ago
Read 2 more answers
Our company is only interested in purchasing a software upgrade if it leads to faster connectivity and data sharing. The old sof
Igoryamba

Answer:

Calculate the average processing time of the new software

Explanation:

Since the average processing time of the old software is already known, the simplest test to see if the new software is faster than the old software will be to calculate the average processing time for the new software and compare it with the average processing time of the old software.

If the new software have an average processing time lower/smaller than that of the old software; we conclude that the new software is faster.

If the new software have an average processing time higher/larger than that of the old software; we conclude that the old software is faster.

6 0
2 years ago
Enter a formula in cell G5 that calculates the difference between the attendance totals for 2018 and 2017. Copy the formula to t
Allushta [10]
This is done by a very simple formula: the only thing you need to type is =x-y where x is the cell that contains the total of 2018 and y being the cell that contains the total for 2017. If both are numeric values you can use the formula = A1-B1 and get your result. Your <span>cells don't have to be in the same order as your formula.</span>
4 0
2 years ago
Is used to process certificates and private/public key information?
Luda [366]
<span>SSL is used to process certificates and private/public key information. </span>SSL stands for Secure Sockets Layer. It is cryptographic protocols <span> that creates a trusted environment and </span>provides communications security over a computer network. The SSL protocol is used for establishing encrypted links between a web server and a browser.
4 0
2 years ago
The problem solving process begins by first ______ the problem.
alexandr402 [8]

Answer:

identifying/acknowledging

Explanation:

7 0
2 years ago
Other questions:
  • Graphical elements that precede each item in a list are known as​ __________.
    8·1 answer
  • A mistake programmers often make with loops is that they ____.
    15·1 answer
  • In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
    5·1 answer
  • Days of the week are represented as three-letter strings ("Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"). Write a javaScript f
    14·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Assume that the following method header is for a method in class A. public void displayValue(int value) Assume that the followin
    11·1 answer
  • Drag each tile to the correct box.
    12·1 answer
  • (a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
    9·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!