1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
3 years ago
11

Which of the following is NOT a safe skill you can use to reduce your risk

Computers and Technology
2 answers:
andrezito [222]3 years ago
5 0

Answer:

<em>D. Always use your high beams</em>

Explanation:

<em>D because high beams can blind incoming drivers, and cause crashes.</em>

4vir4ik [10]3 years ago
3 0

Answer:

I would say driving more slowly at night

Explanation:

When you drive slowly at night this causes accidents when someone is either speeding or not paying attention to the road....They could run into you.

You might be interested in
Rochelle knows that the music on her computer is stored in the form of numbers. Which hardware component processes these numbers
QveST [7]

Answer:

ALU: arithmetic logic unit

Explanation:

Hope this helps i dont know that much about thus unit but i am pretty sure im right

4 0
3 years ago
Self-confidence, blank, and communication are key factors to building positive relationships. Fill in the blank with a 13 letter
german
Maybe: understanding,  encouragement, <span>determination

there are many more, let me know if those don't work

</span>
6 0
3 years ago
Hardware Name:
Fofino [41]

Answer:

I think 2.power supply yaar

4 0
3 years ago
One way to address privacy concerns on the Internet is to a. publicly display any information collected by the company. b. share
TEA [102]

Answer:

c. keep all information collected confidential.

Explanation:

3 0
3 years ago
A structure that organizes data in a list that is commonly 1- dimensional or 2- dimensional
kogti [31]

Answer:

  (a)  Array

Explanation:

An array is a data structure that can be used to organize 1- or 2-dimensional data in a list.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Microsoft Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinec
    6·1 answer
  • Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.
    9·1 answer
  • the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives a
    6·1 answer
  • Which process refers to starting up a computer
    12·1 answer
  • What's the name of the file mainly used to save power point
    7·2 answers
  • Would a hurricane form if the humidity is really high and the breeze is very low
    11·1 answer
  • What are the possible consequences if requirements analysis was done poorly or inadequately? What are the objectives of requirem
    10·1 answer
  • Question 11
    9·1 answer
  • Lesson 3: Wrapping Up Unit 6
    12·2 answers
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!