1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
3 years ago
13

What reasons and evidence does the author use in support of the argument? Check all that apply. Law enforcement used new technol

ogy to identify Pearl’s killers. Law enforcement used old-fashioned technology to find Pearl’s killers. The act enables law enforcement to fight a new war with high-tech means. The act enables law enforcement to fight new threats with antique means. The act allows police to use advanced technology to locate suspects.
Law
2 answers:
Romashka [77]3 years ago
5 0

Answer:

Law enforcement used new technology to identify Pearl’s killers.

The act enables law enforcement to fight a new war with high-tech means.

The act allows police to use advanced technology to locate suspects.

Explanation:

Darina [25.2K]3 years ago
4 0

Answer:

1 3 5

Explanation:

got it right on edgen2020

You might be interested in
Which branch of government does the cartoonist suggest is the most powerful?
siniylev [52]

Answer:

I'm like 80% sure its judicial.

Explanation:

They have judicial as the referees. I'd assume referees have the most power at a football game.

6 0
3 years ago
Under the retributive system, the reason we punish is for the greater good of society.
erastova [34]
The answer is : False
5 0
3 years ago
Do you think that it’s legal to recreat the cards of a game, and play it with other people?
SashulF [63]
No I don’t think it is
3 0
3 years ago
Read 2 more answers
Which law gives an organization more instruction and insight into the type of information security plans/policies required
Jobisdone [24]

Information security policy (ISP) is the law that gives organizations and companies insight into the type of plans and policies required for information security. They go over  data leakage, data breaches, snooping, and control to information.

I hope this helps! :)

4 0
2 years ago
POV FREE POOINTS HACKER
Snowcat [4.5K]

Answer:what?

Explanation: what are the points for?

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why have some states placed restrictions on intrastate and interstate branches? What historical laws gave this right to states?
    6·1 answer
  • Edna is a leading brain surgeon in the United States. She enters into a contract to perform a complicated brain surgery on Ben.
    15·1 answer
  • Nellie Lumpkin, who suffered from dementia, was admitted to the Picayune Convalescent Center, a nursing home. Because of her men
    6·2 answers
  • What is love and how do u know if its real ????
    15·2 answers
  • What are sexual predator laws? What is their significance regarding whether someone is granted bail?
    11·1 answer
  • . Are there any circumstances in which a person should be released
    14·1 answer
  • Which agency requires a college degree for employment?
    12·1 answer
  • What law is this breaking and explain why:
    7·1 answer
  • As sworn officers of the court, prosecutors are required to base their decisions of whether to prosecute solely on ____________.
    12·1 answer
  • Let's Check In The five general principles from the APA are meant to __________. A. be enforceable rules B. be posted in every o
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!