1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
12

Together, what do the divisions of the DHSMV do?

Computers and Technology
1 answer:
Elza [17]3 years ago
3 0
I think the answer is b.  because i looked up the question
You might be interested in
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
Ad libitum [116K]

Answer:

a) all cabling hope it helps

3 0
2 years ago
Nathan took a picture of his friends while they were on a field trip. He wants upload this picture to a photo-sharing site. He w
Alenkinab [10]

Answer:

photoshop

Explanation:

(if there are answer choices pls comment them and  I'll pick an answer from them, but this is just my best guess. : )

5 0
2 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q <= 100; q++) B. for
vladimir2022 [97]

Answer:

b

Explanation:

C and D have equivalent iterations

C:       D:

99    990

90      900

81      810

72      720

63      630

54      540

45      450

36      360

27      270

18      180

9       90

8 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
Other questions:
  • Connected contacts require___ to open.
    11·1 answer
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
  • Which part of the cryosphere comes directly from the atmosphere?
    13·2 answers
  • Make a program that (i) asks the user for a temperature in Fahrenheit degrees and reads the number; (ii) computes the correspond
    8·1 answer
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Which of the following focuses on information related to disease identification, control, and prevention?
    10·1 answer
  • The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new
    8·1 answer
  • Examples of structures that can store homogeneous data element​
    14·1 answer
  • Differentiate between patent and copyright.
    6·2 answers
  • Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!