1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
13

Some one plzz go answer my question in my profile its for 80 POINTS

Advanced Placement (AP)
1 answer:
Andrei [34K]3 years ago
5 0

Answer:

lol lol lol lol lol lol lol lol lol lol lol thanks thanks

You might be interested in
Which advantages are part of renting a home?
kvv77 [185]

Homeowners can make a profit on the sale of their home.

easy to move

-low maintenance responsibility

-low financial commitment

8 0
3 years ago
Que es una empresa fabril
lukranit [14]

Answer:

Son empresas que se dedican a la producción, el resultado de su actividad son productos trasformando materias primas en el proceso de producción. Se denominan por su actividad empresas del sector secundario.

Explanation:

:)

7 0
3 years ago
A statistically significant result in a psychology experiment refers to a
guajiro [1.7K]
The answer is: C. finding not likely due to chance
7 0
3 years ago
Sociologists believe that personality development is affected by all of the following factors except
11Alexandr11 [23.1K]
A) is the answer, youre welcome

8 0
3 years ago
Read 2 more answers
HURRY 15 POINTS
8090 [49]

Answer: build a firewall and add encrypted data storage networks

Explanation:

Network Risk Analysts are the individuals that design the security systems fur the computer. They also monitor networks so as to be able to detect suspicious activities.

When a network risk analyst is hired by a corporation to increase security, the first task that he or she would most likely complete is build a firewall and add encrypted data storage networks.

This measures re necessary so as to prevent hackers hacking into the systems and also protect against why other form of malicious attacks that can affect the systems.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Why do american history textbooks promote the belief that the most important developments in world history are traceable to euro
    10·2 answers
  • Which type of evidence establishes a direct link between a crime and a defendant?
    11·2 answers
  • Which one of the following statements about childcare centers is correct
    7·1 answer
  • "The Love Song of J. Alfred Prufrock" by T.S. Eliot 1. The tone of this poem is
    15·1 answer
  • How does the word gang support the author’s purpose in this sentence? It evokes a positive image of teenagers who are part of a
    15·1 answer
  • 1. Why is it important to protect the quality of the Earth's fresh water supply?
    8·1 answer
  • FREE POINTS AND BRAINLIEST TO WHOEVER ANSWERS THIS RIGHT!
    13·2 answers
  • Plz add more to make it better❤️
    12·1 answer
  • Taking a quiz & i don’t understand please help
    9·1 answer
  • What points should you remember throughout your job search process?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!