1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
4 years ago
6

Need help this is for my technology class. We are doing a city research paper but it’s the rough draft and I’m doing la. But I c

an’t find any businesses that are in la and I need 5 please help please please
Computers and Technology
2 answers:
S_A_V [24]4 years ago
7 0

Answer:

Wendy's

Explanation:

serious [3.7K]4 years ago
5 0
One business is " Backwards Beekeepers," Your welcome. >,<
You might be interested in
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
pickupchik [31]

Answer:

Yes this is true.

Explanation:

7 0
3 years ago
Usually, in organizations, the policy and mechanism are established by the:
Ivanshal [37]

Answer:

Sorry Sorry Sorry

Explanation:

Sorry Sorry Sorry

5 0
3 years ago
Read 2 more answers
In<br>6) which device can not be shared<br>network?​
SCORPION-xisa [38]

Answer:

mouse cannot be shared on network

6 0
3 years ago
The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
Musya8 [376]

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

4 0
3 years ago
Other questions:
  • Assign a pointer to any instance of searchChar in personName to searchResult.#include #include using namespace std;int main() {c
    5·1 answer
  • Write a C++ program that reads students' names followed by their test scores. The program should output each students' name foll
    9·1 answer
  • explain why the intangibility of software systems poses special problems for software project management.
    13·1 answer
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • What does TSOn stand for?
    8·2 answers
  • Develop a Java application that provides program output in a logical manner and incorporates appropriate data types. Similar to
    6·1 answer
  • (main.c File)
    7·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    13·1 answer
  • What are the specifications of mine shaft head gear​
    11·2 answers
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!