1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
15

1. Which of the following is NOT caused by alcohol?

Computers and Technology
2 answers:
Oksi-84 [34.3K]3 years ago
8 0

Answer:

Explanation:reduced concentratjon

inhibited comprehension

decreased coordination

increased heart rate

Alla [95]3 years ago
7 0

Answer:

What are the choices

You might be interested in
Computer application just help me with it all ?
leva [86]

Answer:

ok great !

HAVE A NICE DAY

thanks for points

3 0
2 years ago
Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the ca
elena-s [515]

Answer:

Here you go, Change it however you'd like :)

Explanation:

import random as r

def play_round(p1, p2):

   cards = [1,2,3,4,5,6,7,8,9,10,"J","Q","K","A"]

   play1 = r.choice(cards)

   play2 = r.choice(cards)

   

   while play1 == play2:

       play1 = r.choice(cards)

       play2 = r.choice(cards)

   

   if cards.index(play1) > cards.index(play2):

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p1}"

   else:

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p2}"

print(play_round("Bob","Joe"))

8 0
2 years ago
Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was int
vlada-n [284]

Answer:

2. It was created to connect geographically dispersed researchers with high powered research computers.

3. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.

5. It led to the development of the Internet.

Explanation:

4 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
2 years ago
I need help with this!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them store dat
Bogdan [553]

Answer:

Yes, these things can be considered a computer. And they can also store and process data.

Explanation:

Headphones, radios, dishwashers, and remote controls are all computers because they all have some sort of logic board inside the device to control what it does. Example, a dishwasher has internal components that it uses to keep track of how long the wash/rinse cycle have lasted and how long they are supposed to last.

I hope that helps!

7 0
2 years ago
Other questions:
  • What are some consequences of internet addiction​
    9·1 answer
  • Rori is looking for a way to interact with others while increasing her stamina. Which community resource would be least helpful
    13·1 answer
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • 1 Point
    14·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru
    14·1 answer
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • What is the action of extracting data fragments and then reassembling them in order to recover a file?.
    10·1 answer
  • Summary on how drones can help manage the environment
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!