1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
6

Edible vaccines, a more controversial approach to vaccine development, have been investigated by scientists. Plants can be genet

ically modified to produce viral proteins and when ingested, these proteins ignite the immune system of the consumer. What are the advantages to edible vaccines? What are some of the possible disadvantages?
Computers and Technology
1 answer:
madreJ [45]4 years ago
8 0
I need some more information. If you need any more help with this please leave a relpy.
You might be interested in
Select the correct answer from each drop-down menu.
xenn [34]

Answer:

Siftable are small independent computer that are capable of BLANK (graphics audio video)

4 0
3 years ago
Which protocol that runs on cisco routers shares information between cisco devices?
just olya [345]
The CDP protocol runs on CISCO routers and shares information between CISCO devices. CDP stands for Cisco Discovery Protocol. It is a protocol on Layer 2 (Data -Link layer) of the OSI model that enables CISCO devices to share information between them. The information includes for example the <span>operating system version and IP address.</span>
6 0
3 years ago
What is an electronic ledger that tracks mathematical data
anyanavicka [17]
Computer or calculater.hope this helps
7 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
mojhsa [17]

Answer:

h

Explanation:

4 0
3 years ago
Is the IOT governable by frameworks? Explain your rationale.
polet [3.4K]

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

8 0
3 years ago
Other questions:
  • Formatting can be applied to
    10·2 answers
  • Which of the below statements describes the nature of HTML elements - check as many as apply
    6·1 answer
  • Kak cheat clans royale
    15·1 answer
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
    6·1 answer
  • Does trend in computing important for organization management?​
    8·1 answer
  • which cyber protection condition establishes a protection priority focus on critical and essential functions only
    10·1 answer
  • Computer science is a blank process
    6·2 answers
  • A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
    13·1 answer
  • the php function that is executed is a connection to a database cannot be made is the____ function. die | isset| end | connect.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!