1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

What are the two types of primary safeguarding methods

Computers and Technology
1 answer:
hjlf3 years ago
8 0

Answer:

Guards and devices

Explanation:

You might be interested in
Which conditional tab would you use to add a quick style to a form or report? Arrange Design Format Page Setup
Vilka [71]

Answer:Format

Explanation:

5 0
3 years ago
The layout of an envelope can be adjusted using the ____ tab
7nadin3 [17]
I think it’s the mailings tab
3 0
4 years ago
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
Can you help me correct a sentence?
tamaranim1 [39]
Number 2 is your answer!!!!
6 0
3 years ago
To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso
Sladkaya [172]

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

7 0
3 years ago
Other questions:
  • What is the mid-square method?
    6·1 answer
  • Pointers with classes a) A user-defined class named Timer has a constructor that takes two integer parameters to initialize hour
    14·1 answer
  • What are the advantages of a peer-to-peer network? Select all that apply.
    15·1 answer
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • Let's say that you're the sole IT person in your company, and your boss wants a way to block certain websites from employees. Wh
    6·2 answers
  • Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o
    11·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • Which of the following describes a characteristic of organic light-emitting diodes (OLEDs) used in clothing?
    6·2 answers
  • Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output sho
    5·1 answer
  • How to turn off microsoft teams message notifications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!