1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
3 years ago
15

What is your perception of what a safe classroom looks like

Computers and Technology
1 answer:
Andreyy893 years ago
6 0

Answer:

6 feet apart

Explanation:

You might be interested in
What are a few benefits of virtualization?<br> How do they benefit ?
exis [7]
It can help you experience something before it happens, and it also provides entertainment for some people to see things from a first person perspective. Almost as if they were in the characters shoes.
8 0
3 years ago
You're creating a table for one of your slides, and need to make some modifications to your table structure. Which of the follow
sdas [7]
A. is the correct answer
6 0
3 years ago
After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
allochka39001 [22]

Answer:

People can figure out a way to reach one another without the use of traveling!

Explanation:

5 0
2 years ago
Technical term of stealing personal information in social media.​
iVinArrow [24]

Answer:

stalking/identity fraud

7 0
2 years ago
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation
Alekssandra [29.7K]

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

4 0
3 years ago
Other questions:
  • 10 facts about turbines
    11·2 answers
  • A software programâs _________ indicates what can legally be done with that program.]
    5·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    15·1 answer
  • When can we feel electricity?? Tell me the volt
    15·1 answer
  • Which command allows d1 to configure an ip address on one of its physical interfaces?
    9·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • What is the meaning of the term plot?<br>A. the final outcome of the story​
    8·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!