1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
14

You are driving in the right lane of a municipal road the road has three lanes in your direction ahead of you in the lane to you

r left a car is weaving from side to side you should
Computers and Technology
2 answers:
Mrrafil [7]3 years ago
7 0
Pull Over. Do NOT Try to push the brake or try swerving with the steering wheel. Slowly pull to the side
diamong [38]3 years ago
7 0
Slow down blink lights and pull to side, in case of a drunk driver call 911 and report the license plate and road if possible
You might be interested in
In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
den301095 [7]

Answer:

"Waterfall" is the correct answer for the above question.

Explanation:

  • The Waterfall model is a model which is the first model recognized by some scientists is used to states some rules to develop the software. It is based on the phases of the SDLC. The SDLC is the collection of phase that is used in software development.
  • The waterfall model moves like water moves. It means any next phase starts if the previous phase is completed and the user can not move into previous steps of the model.
  • This is also asked by the question. Hence the answer is the waterfall model.
5 0
3 years ago
___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
Firlakuza [10]

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

3 0
3 years ago
Please tell fast plzzzzzz.​
lana [24]

Answer:

True

Explanation:

4 0
3 years ago
You work as the IT administrator for a small business and are responsible for the corporate network. Until now, the network has
posledela

Answer:

Extend a Volume:

1. in the lower left-hand corner, R click the start page thumbnail and select disk management

2. if needed, click ok to initialize any new disks.

3. R click the volume and select extend volume.

4. click next.

5. for the system volume, you can only extend the volume onto the existing disk. type the amount of disk space to add to the volume and click next. click finish.

Convert a Disk to Dynamic

1. In Disk management, R click the disk and select convert to Dynamic Disk

2. Select the disk to convert, click ok.

3. Click convert

4. If the disk contains a volume, you will be shown a warning message. Click Yes to continue.

Create a Spanned Volume

1. In disk management, R click a disk or free space on a disk and select New Spanned Volume.

2. Click Next

3. Select the disks that will be part of the spanned volume and click Add. You must select at least 2 disks to create a spanned volume.

4. To modify the amount of space used on a disk for the new volume, select the disk in the right box, and then edit the number in the select the amount of space in MB: field.

5. Click next

6. Select the drive letter and click Next

7. Type the volume label, then click next

8. Click finish

9. If the new volume includes a space from a disk that is currently a basic disk, you will be prompted to convert the disk to a dynamic disk. Click Yes to create the volume.

Explanation:

5 0
3 years ago
With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes rea
worty [1.4K]

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

3 0
3 years ago
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
    12·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • Is there a relationship between cybercrime and traditional crime?
    6·1 answer
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over
    9·1 answer
  • Monster Collector
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!