1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
4 years ago
8

A hazard specifically associated with residential roads is __________ .

Computers and Technology
2 answers:
Novosadov [1.4K]4 years ago
4 0
<h2><u>Answer:</u></h2>

A hazard explicitly connected with private streets is "a lot of people on foot, cyclists and left vehicles".

 There are somewhere around ten kind of risk when driving through local locations yet the most pivotal is the left vehicles as I would like to think as thee autos might shroud a little youngster behind hanging tight to cross the street and going to run

. So it is never shrewd to simply glance through the street in such zone as that may cause genuine inconveniences.

Yuliya22 [10]4 years ago
4 0

Answer:

A hazard associated with residential road is <u>plenty of pedestrian, cyclist and parked cars</u>.

Further Explanation:

The hazard associated with residential road is that most of the people are walking on the road and many of them driving on cycles. They create unnecessary traffic for the local residential vehicles like car, scooters and other vehicles. Many times it is seen that some of people park their vehicles on road which also unnecessary hazard in residential roads. Sometimes small functions like birthdays are celebrated in the local park or in road itself that also creates unnecessary traffic on the road as road diversion happens at that time.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Senior Secondary School
  • Subject: Computers and Technology
  • Chapter: Environmental Study

Keywords:

Hazard, specifically associated, residential road, plenty of pedestrian, cyclist, parked cars, unnecessary traffic, road diversion, parks, car, scooter, other vehicles

You might be interested in
Which ics function records time accounting and procures needed items?
vladimir1956 [14]
It is the finance / administration function that records time accounting and procures the needed items
7 0
3 years ago
What is a spacecraft virus?
photoshop1234 [79]
A spacecraft virus<span> is a type of bacteria virus that feeds on other bacteria. It got it name because it is mostly shaped like a spacecraft.</span>
4 0
3 years ago
Read 2 more answers
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
3 years ago
Which of these is NOT an advantage of the impact of computer careers.
nikdorinn [45]
I believe the answer could be the first choice. I'm not quite sure, though
4 0
3 years ago
Read 2 more answers
Free wifi is typically offered on _ network
Marina CMI [18]

Free Wi-Fi is typically offered on public network

8 0
3 years ago
Read 2 more answers
Other questions:
  • How to play music out of your apple watch?
    6·1 answer
  • A computer has a memory ________, rather than just a single memory component. The lowest level is some form of ________ storage
    11·1 answer
  • Which of the following characters is not allowed for java variable names
    7·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • Select one of the wrong answer from question 1 and explain why it is ironic.
    7·1 answer
  • Is this App for real?​
    5·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • The beginning statement of a loop is called a declaration.<br> True<br> False
    10·2 answers
  • Use the following flowchart to implement a simple application that will help students decide whether computer science is a good
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!