1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
12

The concepts of culturally approved goals and the legitimate means of achieving these goals was devised by

Computers and Technology
2 answers:
xxMikexx [17]3 years ago
6 0

the answer is not C the anwser i have no idea what it is but on my test i got it wrong.

svetlana [45]3 years ago
5 0

The answer to your question is letter B.

You might be interested in
This is a python program.
denpristay [2]

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

7 0
3 years ago
Which of the following should be clicked to open Backstage View?
lora16 [44]

Answer:

File tab

Explanation:

source https://www.computerhope.com/jargon/b/backstage-view.htm

7 0
2 years ago
Read 2 more answers
Meaning of mesh topology​
Pachacha [2.7K]

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

<h3>What is meant by mesh topology?</h3>

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

brainly.com/question/14879489

#SPJ1

6 0
1 year ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
One of the factors that influence the effectiveness of chemical sanitizer works effectively between 13° C and 49° C​
12345 [234]

Answer:

temperature

Explanation:

Temperature is one of the three factors known to have remarkable influence on the effectiveness of chemical sanitizers. These sanitizers generally perform best at temperature range of 13 – 49 degrees centigrade.  

Also, contact time is one of the factors that is needed for the sanitizers to effectively kill the microorganisms. The item to be cleaned should come in contact with the chemical for the recommended period of time.

3 0
3 years ago
Other questions:
  • WHEN COPYING EXISTING SPREADSHEET DATA TO A WORD DOCUMENT YOU NEED TO SELECT?
    12·1 answer
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • Using complete sentences post a detailed response to the following.
    10·1 answer
  • How to give a brainiest on a question? if you teach me i will give brainiest
    7·2 answers
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!