1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
6

In the glare of the sun, it is hard to see and be seen. Name six precautions

Computers and Technology
1 answer:
BartSMP [9]3 years ago
7 0
<span>In the glare of the sun, it is hard to see and be seen. Some precautions would be :
1) </span><span>Have a polarized sunglasses ready, they can help reduce glare.
2) Use your sun visor – it can help to block out the sun. 
3) Leave more following space between you and the next vehicle. 
4) Drive with your headlights on to increase your visibility to other drivers. 
</span>5) Keep your windshield clean, inside and out, avoid storing papers or
     other items on the dashboard. 
6) If having a difficult time seeing the road, use the  lane markings to help
     guide you.
You might be interested in
Which of the following behaviors does not harm a company if your employment is terminated?
saul85 [17]

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

3 0
3 years ago
Which storage is faster than secondary storage​
kozerog [31]

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.22-Aug-2019

5 0
2 years ago
Read 2 more answers
Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
bazaltina [42]

Answer:

A Background color

Explanation:

7 0
3 years ago
On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
nika2105 [10]

Answer:

First of all the team should excuse to the product owner for not being responsible and committed to the deadline.

Secondly, as they have completed the 8 stories, so they should revise and check the flaws in those stories and send to her.

Because when the product owner will check and happy with them, she will surely discuss the remaining stories with the team.

6 0
3 years ago
What number will this code return?<br> Math.max(7, 5, 9);
Anon25 [30]
9

JavaScript’s Math module has a max method that finds the max of the given arguments.

I’m not sure how I can be any clearer
I’ve attached a screenshot if you still have no clue

8 0
2 years ago
Other questions:
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • Free points! your welcome
    9·2 answers
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • The _____ toolbar can be customized to the preferences of the user.
    7·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • Write down the steps that you will take to organize your files
    12·2 answers
  • When security issues are a special concern, companies want to take extra steps to make sure that transmissions can’t be intercep
    7·1 answer
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • Problem: Mr. James Reid, the director of admissions at MOGCHS University, has
    14·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!