1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maurinko [17]
3 years ago
10

PLEASE HELP! 25 POINTS!

Computers and Technology
2 answers:
elena-s [515]3 years ago
8 0
I actually did this hauling a trailer with a Tahoe on the trailer on the interstate. And I just tried my best to keep my trailer from hitting any other vehicles and got my truck stopped as quick as possible
irina [24]3 years ago
6 0

Answer:

Its hard to answer unless im in the situation but id find a way to stop the car and figure out a way to get out and then call police

Explanation:

You might be interested in
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
yulyashka [42]

<u>Client-server</u> implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own.

<u>Explanation:</u>

The client-server can be utilized on the web just as on a neighborhood (LAN). Instances of customer server frameworks on the web incorporate internet browsers and web servers, FTP customers and servers, and the DNS. Different hosts get to those assets yet don't have administrations of their own. Since it permits arrange permits numerous PCs/gadgets to interface with each other and offer assets.

5 0
4 years ago
A top level class may have only the following accessmodifier.
GREYUIT [131]

Answer: Public

Explanation:

 A top level class can have a public, as top level cannot be private and protected because the modifier private is not allowed. As, top level is a class which is not a nested class. Interface of a access modifier is either public or no modifier. There are two types of access control modifier are top level - public and member level- private, protected.

3 0
4 years ago
Machine language—0s and 1s—would be very difficult for a programmer to write in; thus a low-level (second-generation) language,
adelina 88 [10]

Answer:

Assembly Language.

Explanation:

Machine Language:- It is the lowest level programming language.It represent that the data in the form of 1's and 0's it is like this because the machines understand only binary or 1's and 0's.

Assembly Language:-It is the second generation of programming language.It can be used by a programmers to write program using abbreviations and basic words instead of binary numbers.

5 0
3 years ago
What action demonstrates unethical behavior?
patriot [66]

Answer:

C. Taking credit for another person's work

Explanation:

Taking credit for another persons work is lying and is a harmful thing to do to another person rather then working yourself

6 0
3 years ago
You're the sole IT employee at your company. Most of the computers in your fleet are Windows machines. Your boss wants you to se
Gnesinka [82]

Answer:

The file service that should be used is HTTP SERVER

Explanation:

Below is a breakdown of different servers;

Samba server is used for LINUX platforms.

NFS is also used for UNIX / LINUX

Database server is used for only data storage purposes

HTTP SERVER can be used for network file storage by WIndows Systems.

The best option to adopt for file storage will be HTTP server

6 0
3 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • Which option represents the location of the Data Table function?
    12·1 answer
  • Hannah weighs 210 pounds using the English System of measurement. If we convert her weight to the Metric System, she would weigh
    14·1 answer
  • _____ refers to the physical components used to collect, store, organize, and process data and to distribute information
    7·1 answer
  • How long is a subnet mask? (Please select one of the four options)
    5·1 answer
  • State and derive the law of conservation of energy​?
    8·2 answers
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • Debug the code in the main method of this class, which is intended to initialize an array named arr to hold 3 ints, fill this wi
    15·1 answer
  • Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex:
    13·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!