1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
7

Which of the following is something you need to keep an eye out for

Computers and Technology
2 answers:
cricket20 [7]3 years ago
7 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation: Near packed intersections pedestrians commonly ignore "don't walk" signs.

Brilliant_brown [7]3 years ago
4 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation:

Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for  near packed intersections.

You might be interested in
Suppose company A wants to develop a program that duplicates the functionality of a programm by company B. Describe how company
kompoz [17]
The design of the software is covered by copy right unless it is open sourced or is a very common interface. They would need to come up with their own design and way of solving the problem to have a solution that was not copyrighted.
5 0
3 years ago
Information systems include all of these
Ulleksa [173]

Answer:

D

Explanation:

because you need people to access software through hardware and data through information and procedures.

4 0
3 years ago
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
What is the effect of flattening layers in image editing?
PolarNik [594]
The answer to this blanks are black and visible
6 0
2 years ago
Read 2 more answers
The first documented use of work release was in the ____.
sattari [20]
I'd say in the United States.

This United States penological practice was inaugurated in 1913 by state senator Henry Huber. Typically, under the work release program, a prisoner who is sufficiently trusted  is employed outside the jail during working hours and returns to confinement at the end of the shift.



6 0
3 years ago
Other questions:
  • True or false? It is just too challenging to have different password for every
    12·1 answer
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.
    5·1 answer
  • Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
    9·1 answer
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • What is the second stage of information processing cycle​
    10·2 answers
  • When proofreading, you should do all of the following except _____.
    14·1 answer
  • What distinguishes Accenture as a holistic provider of Extended Reality (XR) services?.
    9·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!