1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
4 years ago
14

Do you think boot-camp-style treatment centers can help young. People kick smartphones addictions?

Computers and Technology
2 answers:
Elan Coil [88]4 years ago
6 0

I'm guessing this is an opinion question so here's mine:

No, obviously not. If anything it would make the child worse and want to rebel more and try to fight to get their phone.

Margaret [11]4 years ago
5 0

Answer:No

Explanation: Because that would be torture for that child that child would just become more worse and try to escape and they could end up having a bad life.

You might be interested in
How does computer network work in a paragraph
Maksim231197 [3]

You go in to the networks crosh/Linux and you insert the info you want in code

7 0
3 years ago
Question 5 of 5
Archy [21]

<u>Answer:</u>

<em>Sewage treatment Programs </em>

<u>Explanation:</u>

Sewage treatment programs are the right choice <em>because these are the source to create germs and if we understand how to be clean, most of the disease is avoided. </em>

<em>Drug regulation:</em> It is nothing but the continuous treatment of prolonged disease where pills needs to be taken regularly to protect patients from death or to avoid disease become more severe.

<em>Physical fitness campaign:</em> This concentrate on to how to keep bod fit through exercise and it does not deal with hygiene.

<em>Nutrition Education:</em> It’s a kind of protection mechanism where in-take of food is really concentrated to fight against germs.

5 0
4 years ago
A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to
IRINA_888 [86]

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

<h3>What is C$ administrative share?</h3>

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

brainly.com/question/15267859

#SPJ1

4 0
2 years ago
What type algorithm can solve the problem of routing an email message along the shortest possible path through intermediate comp
allochka39001 [22]

Answer:

Exponential.

Explanation:

The router is a network device that route packets to its destination through a path on its routing table. The routing table contains the path to the next hop count of the destination network. A path or route could be learnt statically or dynamically.

Static routes are learnt based on direct connection to other router or a hard coded path configuration. A dynamic route is learnt through a routing protocol. RIP, EIGRP, OSPF, IS-IS are examples of routing protocols.

The OSPF or open shortest path first is a protocol that uses algorithm, load cost and other metrics to determine paths for packets. The exponential algorithm is used by the OSPF to determine the shortest and noise-free path to a destination.

4 0
3 years ago
Many people describes computers as complex machine. what can this mean?
Airida [17]
They work in many different ways?
8 0
4 years ago
Other questions:
  • They predicted another cold day in Seattle. They predicted another windy day in Seattle. Combine the sentences into one sentence
    8·1 answer
  • Answer the following questions:
    7·1 answer
  • CHALLENGE ACTIVITY 4.2.2: Basic while loop with user input. Write an expression that executes the loop while the user enters a n
    14·1 answer
  • Let f and g be two one-argument functions. The composition f after g is defined to be the function x 7→ f (g (x)). Define a proc
    15·1 answer
  • What do “phone-copying” systems allow investigators to do?
    9·1 answer
  • Hello everyone! Happy Wednesday, or Thursday! (Depending on where you are in the world, because of the atmosphere and what not :
    8·2 answers
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • Tell me everything that happened in the fortnight galactics event. WHO EVER HAS THE BEST EXPLANATION WILL GET BONUS POINTS AND W
    14·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!