1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
7

The best protection from an explosive device is: (1 point)

Computers and Technology
1 answer:
Juliette [100K]3 years ago
6 0
<span>The best protection from an explosive device is:
</span>
<span>b. protective clothing</span>
You might be interested in
___________ is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or
GaryK [48]

Answer: Package software

Explanation:

Packaged software is the software that contains the functions and programs that are similar in the nature and features.

It is designed in such a way so that it can attract the customers and user by providing the benefit of the selling of the collection of programs rather than buying individual software programs which costs higher.

Thus, it produced at a large scale as well as bought by numerous users.

4 0
3 years ago
Which of the following is a sign that a website is inappropriate?
nata0808 [166]

Answer:

A

Explanation:

If you find something embarrassing, its more likely that other people with also think its embarrassing. All the other points are on the internet right now. Amazon sells things, News show information and there are political campaigns to show you there offers

3 0
3 years ago
Read 2 more answers
When would you use a composite primary key? Group of answer choices
vichka [17]

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

6 0
3 years ago
Read 2 more answers
Which of the following statements is true of subroutines? Check all that apply.
erica [24]
I believe it’s the first answer

“They can be used in multiple places “

But I’m not sure!!
6 0
3 years ago
Read 2 more answers
Which of the following is a geolocation service on an Internet browser?
seropon [69]
It may be D) because it is actually a simplified version of Google maps.
7 0
3 years ago
Read 2 more answers
Other questions:
  • An effective team would never have​
    9·1 answer
  • A powerpoint ________ is a set of unified design elements.
    5·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • Provide the definition for each of the following structures and unions:
    8·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Liquid water can change into a gas and become part of the air. When water is a gas, what is it called?
    7·1 answer
  • It is possible to limit the search results to a range of publication dates.
    13·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!