1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
6

If a car's is malfunctioning, people in the car will become ill when driving long distances, especially if the windows are close

d.
Computers and Technology
2 answers:
galben [10]3 years ago
5 0
The Carbon Monoxide will build up in the inside of the car by venting through, causing the passengers to breathe it. It will first make them ill, then kill them. They cannot detect this gas
kari74 [83]3 years ago
5 0

Answer:

If a car's A/C air conditioning system  is malfunctioning

Explanation:

When the Air conditioning system of a car is malfunctioning the car will become extremely hot especially when the windows are closed and the car is driving long distance and this might lead to heat stroke for the occupants of the car if the heat becomes extreme to bear.

when driving with the windows open,the inside of the car won't be so hot as with when the windows are closed this is regardless if the A/C system of the car is malfunctioning or not.

You might be interested in
A laptop gets recycled by an e-waste recycling company once it can't be used anymore. Which stage of the hardware lifecycle does
torisob [31]

Answer:

Retirement.

Explanation:

When a laptop gets recycled by an e-waste recycling company once it can't be used anymore. This belongs to the retirement stage of the hardware lifecycle.

Hardware lifecycle can be defined as the management of the total or overall useful life of an equipment or device, so as to maximize or enhance the benefits to be derived from its use.

The retirement stage of a hardware represents the stage where the hardware has reached the end of its life-cycle and as such can not be used to perform the task for which it was designed. It is at the retirement stage, that hardwares are written off as scraps and are to be replaced by another because they can't be used anymore, as well as disposal for recycling purposes.

5 0
3 years ago
If the algorithm does not have instructions for unanticipated results, the computer program will
bixtya [17]
ANSWER: The computer program will ✔ halt . A(n) ✔ recipe is an algorithm.

BRAINLIEST please and good luck!
7 0
3 years ago
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
Artyom0805 [142]

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

brainly.com/question/13171394

8 0
2 years ago
Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
larisa [96]

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

4 0
3 years ago
Elena is used to kissing her friends on both cheeks as a form of greeting in her native country. She notices that her new friend
Veseljchak [2.6K]

Answer:

c. Norms.

Explanation:

When Elena noticed her friend getting uncomfortable when she kisses him on the cheeks as a form of greeting she was violating his norms.

Norms are something that is standard or typical.

In USA there they not used to kiss on the cheeks to greet their friends there would be some other norm of greeting someone.

5 0
3 years ago
Other questions:
  • What will be the output of the following Python code? class A: def test1(self): print(" test of A called ") class B(A): def test
    15·1 answer
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • What is the basic difference between a printer and a plotter?​
    12·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • What devices gives input​
    5·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • I don't know if this is supposed to go here or art but i need help with photoshop, basically you can create whatever you want bu
    7·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!