1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
6

Edible vaccines, a more controversial approach to vaccine development, have been investigated by scientists. Plants can be genet

ically modified to produce viral proteins and when ingested, these proteins ignite the immune system of the consumer. What are the advantages to edible vaccines? What are some of the possible disadvantages?
Computers and Technology
1 answer:
madreJ [45]4 years ago
8 0
I need some more information. If you need any more help with this please leave a relpy.
You might be interested in
I forgot to tell it’s on Roblox for those who play and wanted to be friends and new ppl username is mosarider489
never [62]

Answer:.

Explanation:

.

8 0
3 years ago
Read 2 more answers
What is 16/17 simplified?
77julia77 [94]
16/17 can't be simplified but if you want it as a decimal it's 0.9412 or 0.94
7 0
3 years ago
Read 2 more answers
What are the 3 attributes of information?
Anton [14]

As previously said, the three highly important qualities of validity, accuracy, and completeness can be expanded into the information quality of integrity.

For information to be valuable and to meet the definition of information, it must largely have the characteristics of relevance, availability, and timeliness. Accuracy, completeness, consistency, distinctiveness, and timeliness are five qualities of high-quality information. For information to be accurate and valuable, it must be of high quality. Standard attributes, commonly referred to as global attributes, work with a wide variety of elements. The essential attributes such as accesskey, class, contenteditable, contextmenu, data, dir, hidden, id, lang, style, tabindex, and title are included in them.

Learn more about information here-

brainly.com/question/5042768

#SPJ4

4 0
1 year ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
3 years ago
In discussing inventory, Helena mentions that bikinis for sale on the website are not always in stock. Say customer feedback ind
alekssr [168]

Answer:

decide that when online customers and retail stores order bikinis, they will never have to wait more than two weeks for the order to arrive.

Explanation:

Based on the information provided within the question it can be said that in this scenario the best action that Helena can take is to decide that when online customers and retail stores order bikinis, they will never have to wait more than two weeks for the order to arrive. Otherwise she will begin to lose customers constantly by not having stock or shipping the product in time. These losses will continue to amass and may eventually ruin her business.

6 0
3 years ago
Other questions:
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • "write a program that reads two floating point numbers and prints their sum difference and product."
    13·1 answer
  • Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
    7·2 answers
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • Does YouTube have the potential to change academia as we know it, or is that a bit of a stretch? Explain.
    9·2 answers
  • a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collect
    13·1 answer
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • What Pre-Built PC should I get? I don't have a lot of money so I'm looking for cheap options.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!