1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
6

When driving, you should scan a minimum of_seconds ahead of you. A.5 B.10 C.15 D.20

Computers and Technology
1 answer:
sveta [45]3 years ago
6 0

Answer:C

Explanation:

15

You might be interested in
Byron wants to use Quick Parts to insert reusable content into a company Word document. Where will he access this option? Design
storchak [24]

Answer:

Insert tab

Explanation:

To use <em>Quick Parts</em>, first go to Insert tab then text group. The icon of <em>Quick Parts</em> is there in the attached picture.You can use the <em>Quick Part Gallery</em> to create, store, and reuse pieces of content, including <em>AutoText</em>, document properties (such as title and author), and fields. These reusable blocks of content are also called <u><em>building blocks</em></u>. <em>AutoText</em> is a common type of building block that stores text and graphics. You can use the <em>Building Blocks Organizer</em> to find or edit a building block

7 0
3 years ago
Read 2 more answers
REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
aev [14]

StrawberryTeaa (could be any fruit: blueberry, peach, etc)

potatoxchip

pastelsquid

SquishyPeach

GummiBear

ElegantFlaws (could add an e and remove the s: EleganteFlaw)

hunnie_b (or honee, honnie, hunni, etc)

agonyisheree

It's cool if you don't like these. I had trouble when I changed my user too. But you'll find your perfect username eventually. :)

7 0
3 years ago
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices th
navik [9.2K]

Answer: (C) Ransomware

Explanation:

The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.

The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.  

It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.  

Therefore, Option (C) is correct.

4 0
3 years ago
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
We use _____command to get data from the user? (python)
Genrish500 [490]

Answer:

INPUT

Explanation:

EXAMPLE PYTHON CODE

_______________________________________________________

INPUT CODE:

_______________________________________________________

foo = input('foo: ')#Have some text printed before the input field

bar = foo

print(bar)

_______________________________________________________

OUTPUT CODE:

_______________________________________________________

foo: Hello World!

Hello World!

>>> bar

'Hello World!'

>>>foo

'Hello World!'

5 0
3 years ago
Other questions:
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • Prior to the development of e-commerce, web sites primarily delivered static html pages. true
    11·1 answer
  • What shortcut bring up the print page
    8·2 answers
  • A web application starts when a client sends _______ to a server?
    13·1 answer
  • Which of the following is not a true statement? You can import a table or a query directly from an Access database into an Excel
    15·1 answer
  • Machines may aid in making work easier over a longer distance. true or false.
    7·1 answer
  • When Twitter is used to gather a large group for a face-to-face meeting it is called
    10·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • Generalized goals are more likely to be achieved than specific goals. True or False
    7·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!