1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
9

Need Help!

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0

Answer:

A and C are the only <u>legal</u> but unethical options

You might be interested in
In the process of benchmarking for a variable expense (such as payroll) the typical metrics used are "Total Dollars" and "Dollar
gregori [183]

Answer: True

Explanation:

5 0
3 years ago
A
tensa zangetsu [6.8K]
34 because its 34 ;)
8 0
4 years ago
Is a network traffic management device used to connect different network segments together?
son4ous [18]
No, network traffic management software is only concerned with the health of the Network.
7 0
3 years ago
Help me please with this
LUCKY_DIMON [66]

Answer:

Explanation:

QUestion 2 is A

QUestion 1 is A i think

7 0
3 years ago
True or false. Every word has only one correct spelling and pronunciation.
iren2701 [21]
<span>Every word has only one correct spelling and pronunciation.
This is a false statement.
</span>
6 0
3 years ago
Other questions:
  • How do I learn coding??? ​
    5·2 answers
  • 2) Complete the get_num_of_characters() function, which returns the number of characters in the user's string. We encourage you
    11·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • As the demand for goods and services increases, job growth _____. a. increases b. decreases c. remains the same d. none of the a
    15·2 answers
  • Write a program that implement a bubble sort ?
    5·1 answer
  • Create a program in Python that prompts the user to enter an integer number within the range of 1 to 10 inclusive. The program s
    15·2 answers
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • Coal, nuclear and natural gas power plants all transform thermal energy into electricity
    14·2 answers
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • Since the size of cache is always smaller than the size of the main memory, the sum of bits of the offset and index of a cache w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!