1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
12

When should you talk to an adult you trust

Computers and Technology
1 answer:
Gnesinka [82]3 years ago
5 0

Answer:

you should talk to them when u think its the right time and you think u can trust them

You might be interested in
How could the following line of code be shortened?
Alinara [238K]

Answer:

2

Explanation:

The second option is the only one that will work. The last would work but doesn't make the code any shorter.

8 0
2 years ago
If wearing protective gloves, there's no need to wash your hands after exposure to blood.
Nataliya [291]

Answer:

No, still wash hands

Explanation:

5 0
2 years ago
Objectives ** WILL GIVE BRAINIST PLEASE**
mamaluj [8]

Answer:

of which std this question is

8 0
2 years ago
Read 2 more answers
(photoshop cc)
iren2701 [21]
Black Point<span> Compensation option </span>controls whether to adjust for differences in black points when converting<span> colors </span>between color spaces<span>.

A is the answer :)

</span>
5 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Other questions:
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • Which of the following applications can be used as a data source for a Microsoft® Word® mail merge? A.Outlook Contacts B.Microso
    9·2 answers
  • What does rwd stand for?
    8·2 answers
  • Why should you thank the customer after resolving an issue?
    7·2 answers
  • Discuss two advantages and two disadvantages of agile methods.
    6·1 answer
  • What is wrong with question four? Find the error and then correct it
    11·1 answer
  • Help with this quiz question thank you!
    12·2 answers
  • Select the correct answer.
    6·2 answers
  • 72. In Object Oriented Programming, a class_____ starts
    12·1 answer
  • The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!