1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
10

A study is conducted to confirm the statement "Punishment will be harsher for drunk drivers who cause serious injuries than for

drivers who cause mild injuries." This statement, which is a guess at the outcome of a hypothesis, is an example of a:______.a) theoryb) predictionc) scientific lawd) research question
Social Studies
1 answer:
Alika [10]3 years ago
5 0

Answer:

b) prediction

Explanation:

Based on the information provided it can be said that this statement, which is a guess at the outcome of a hypothesis, is an example of a prediction. That is because it is guessing as to what will happen (consequence) in a certain scenario without actual proof or facts. Therefore predicting based on very little to no information.

You might be interested in
A woman was driving carefully but with an expired driver’s license, in violation of a statute requiring license renewal. When sh
Ksenya-84 [330]

Answer:

d hope it correct

Explanation:

its true just because she has an expired license doesn't mean anything in the cause of the accident

6 0
2 years ago
What was one important outcome in the Atlanta campaign of 1864
melisa1 [442]

The Atlanta Campaign comprised a series of battles that took place during the summer of 1864 in the Western Theatre during the American Civil War.

John Bell Hood replaced Johnston as the leader of the Confederate forces. He was a recklessly aggresive leader who conducted several frontal attacks against the Union army and kept on constantly challenging his enemy. In the end, his army was besieged in Atlanta, and the result of this campaign was that it ended up setting the scenario for the Sherman's March to the Sea and the end of the war, with the victory of the Union.

7 0
2 years ago
The heliocentric theory of the solar system was in direct opposition to which civilizations ideas of the universe?
Sunny_sXe [5.5K]

Answer:

It was in direct opposition to the civilizations below:

A. Ancient Rome

B.Ancient Greece

Explanation:

The heliocentric theory of solar system places the sun at the center of the universe. This was in direct opposition with Geocentric theory model promoted during the Ancient Greece and Roman period.

This theory places the earth at the center of the universe due to the fact that, the sun tends to revolve around the earth once a day (when viewed from any part of the world) and earth seems to be unmoving from the perspective of those observers.

It was Copernicus who propounded the heliocentric theory of the solar system that supersedes this Geocentric system after so many centuries.

4 0
2 years ago
Why is baseball in all its forms – from T-ball to the major leagues – important to Americans of all ages?
mash [69]
Baseball in all it's forms is important to America because it is part of it's history and culture. Baseball was the first sport to be really famous and celebrated commercially. Baseball has a long history of ups and downs, highs and lows.
8 0
3 years ago
In your opinion, How importance of having a security tools, privacy, social networking, employment contacts in hotel and why?​
ycow [4]

Answer:

With the increased use of social tools for business communications, social media security is more important than ever.

While the benefits of social are clear, there are risks to be wary of. According to the latest EY Global Information Security Survey, 59% of organizations had a “material or significant incident” in the past 12 months.

If you are on social (and who isn’t?), you need to protect yourself against common social media security threats.

Here’s how.

Common social media security risks

Unattended social media accounts

It’s a good idea to reserve your brand’s handle on all social media channels, even if you don’t plan to use them all right away. This allows you to maintain a consistent presence across networks, making it easy for people to find you.

But it’s important not to ignore the accounts you don’t use yet, the ones you stopped using, or don’t use often.

Unmonitored social accounts can be the target of hackers, who could start posting fraudulent messages under your name.

Once they gain control, hackers can send anything. That could mean false information that’s damaging to your business. Or maybe it’s virus-infected links that cause serious problems for followers. And you won’t even notice until your customers start coming to you for help.

Human error

Everyone makes mistakes. In today’s busy world, it is all too easy for an employee to accidentally expose the company to threats online. In fact, “employee weakness” was responsible for 20% of cyberattacks, according to the EY Global Information Security Survey.

Something as simple as clicking on the wrong link or downloading the wrong file could wreak havoc.

Some online challenges and quizzes can also be problematic. By completing them, employees can accidentally create social media security issues.

Explanation:

hope it's helpful

6 0
3 years ago
Other questions:
  • Why did immigrants vote for "bosses"?
    5·2 answers
  • What do we use in modern times that is similar to the Sumerian plow
    15·1 answer
  • E. Describe strategies you will use to create an emotionally safe classroom environment by doing the following: 1. Describe at l
    7·1 answer
  • Unfortunately, a good personality can be overshadowed by poor mental or emotional health. True or False.
    8·2 answers
  • Suppose a surveyor wants to conduct a phone survey about a new song. She plans to take a simple random sample. However, some peo
    5·1 answer
  • Please help me 100 points!!!
    7·2 answers
  • . The purpose of the responsible party system is to Group of answer choices b. recruit candidates for public office who agreed w
    8·1 answer
  • Describe two ways how trade with other civilizations and people contribute to the Greek civilization?
    7·1 answer
  • What is SODIS method of water purification?
    15·1 answer
  • Who are the threat agents who will be most interested in attacking web applications created through appmaker?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!