1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
4 years ago
5

Alcoholism is a chronic disease caused by a dependency on alcohol. Which signs point to alcoholism?

Computers and Technology
2 answers:
Lyrx [107]4 years ago
8 0

Answer:

• An inability to limit drinking

• The continued use of alcohol despite repeated problems

• Strong cravings for alcohol

Explanation:

trasher [3.6K]4 years ago
3 0

Answer:

You might experience temporary blackouts and at times memory loss for the short term.

Sudden change in mood, and facing irritability signs

Coming up with excuses for drinking like relaxing, stress, feel normal or deal with stress

keeping distance from friends and various family members

Drinking away from all and in privacy

Suffering from hungover while you are not drinking

Changing group or acquaintances and appearance you usually are with previously

Explanation:

Please check the attachment.

You might be interested in
The operating system is not directly involved in one of these tasks.Immersive Reader
Alex73 [517]
Displaying a web page
3 0
3 years ago
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
3 years ago
Read 2 more answers
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Sort short_names in reverse alphabetic order.
tangare [24]

lst = short_names.split()

print(sorted(lst,reverse = True))

6 0
3 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
Other questions:
  • You wish to enter your exam scores in a spreadsheet. Which function will help you find how each subject’s score relates to the o
    8·1 answer
  • Credibility means that the reader perceives value in what you write.<br> True False
    12·1 answer
  • Mateo could not find the undo command or shortcut. He should _____.
    15·2 answers
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • Laura wants to know more about the organization to which she has applied. What can she do to know more about the organization’s
    12·1 answer
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • Kim is creating a PowerPoint
    13·1 answer
  • What is meant by check digit
    10·1 answer
  • Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that dea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!