1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
6

Help me please............

Computers and Technology
2 answers:
garik1379 [7]3 years ago
7 0
I believe the correct answer is B) Chain of command.
~Silver
Alekssandra [29.7K]3 years ago
4 0
I am pretty sure it is chain of command that is most accurate
You might be interested in
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
SOVA2 [1]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
5 0
3 years ago
Read 2 more answers
Does anyone know the answer for question d (questions in the picture btw)
VashaNatasha [74]
Yessssss bdbfbfbsjebfjcjde
6 0
3 years ago
What is co-operating process
Greeley [361]

Answer: A process is independent if it cannot affect other process or be affected by it

Explanation:

3 0
4 years ago
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
A function named function1 is defined in a module named module1. Suppose function1 has no parameter. Which of the following Pyth
Oduvanchick [21]

Answer:

Option C i.e., both A and B is the correct option to the following question.

Explanation:

Because in the following statement which is for the Python Programming Language, they can define the function i.e., "function1" without any argument and they can call that function with the help of another module then, they can call that function by using both methods. So that's why the following option is correct.

7 0
3 years ago
Other questions:
  • "The pkill command terminates _________."
    14·1 answer
  • Angela and Jose saved files to a USB drive as well as on their computers' hard drive. A Angela and Jose saved files to a USB dri
    11·1 answer
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • Why is it helpful that the ribbon tabs can collapse?
    8·1 answer
  • One reason to move to a paperless society is that printers are becoming prohibitively expensive true or false
    13·2 answers
  • What is considered to be the core of the Unix operating system ?
    14·1 answer
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • Anyone play Ro-blox ? without the -
    7·2 answers
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!