1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
7

What is another word for violation

Computers and Technology
1 answer:
serg [7]3 years ago
4 0

Answer:

Infringement

Explanation:

The others are incorrect

You might be interested in
HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
Bingel [31]

Answer:

different or difference between Dot-matrix and Daisy-wheel printer

3 0
3 years ago
Name at least two primary forms of identification needed to obtain a learner’s license.
eimsori [14]
Depends on the state but usually;
1. A state I.D. card
2. A U.S. passport
3. A U.S. citizen certificate
4. A U.S. military I.D. card
4 0
3 years ago
Read 2 more answers
Explain how it makes you feel that you must share the road with others
Tpy6a [65]
I feel like it is good to share the road.

8 0
3 years ago
Place Letter or word in correct section where it says labels bellow
love history [14]
A beauty its not b c or d
3 0
3 years ago
Read 2 more answers
Discuss the three different software applications of Microsoft that you have leaned in this class (Word, PowerPoint and Excel).
sammy [17]

Answer:

ok!

Explanation:

Word is more for writing documents and letters, PowerPoint is used for presentations for a class work etc. Excel is a handy software that can be used to store and organize many data sets. Using its features and formulas, you can also use the tool to make sense of your data. For example, you could use a spreadsheet to track data and automatically see sums averages and totals.

7 0
3 years ago
Other questions:
  • What does the term Gestalt mean?<br> A image<br> B graph<br> C big<br> D part <br> E whole
    11·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
    9·1 answer
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most
    8·1 answer
  • Write a java program to read elements in an array from user and count total number of duplicate elements in array.
    12·1 answer
  • What are LinkedIn automation tools used for?
    14·1 answer
  • When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed ha
    5·1 answer
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!