1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
6

Can anyone fill in the space please

Computers and Technology
1 answer:
Anton [14]3 years ago
8 0
The answer is the stove which has and pressure
You might be interested in
A database stores a large amount data in vertical ___
myrzilka [38]

Records for the first one and table for the second one

4 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
What are the steps to configure user information in a document?
chubhunter [2.5K]

Answer:

file, properties, options, general

Explanation:

4 0
3 years ago
Read 2 more answers
Is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Natalka [10]

Do not access links or hyperlinked media such as buttons and graphics in email messages.

<h3>What is a best practice that can prevent viruses and other malicious code?</h3>
  • View email in plain text and don't view email in Preview Pane.
  • Using antivirus software is the best way to defend your computer against malicious code.
  • If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system

To learn more about malicious code, refer

to brainly.com/question/9143118

#SPJ4

7 0
1 year ago
Your foot brake must be able to stop your car within __________ when it is travelling at 20 mph.
ohaa [14]

Answer:

Your foot brake must be able to stop car within 5.18 m

Explanation:

d = s^{2}  / (250 * c_{f} )

d is breaking distance.

s is speed in km/h

c_{f} is coefficient of friction normally 0.8

250 is  constant.

Give the speed in mile first convert it to km/h

1 km = 1.60934 mile

speed in km= 20 * 1.60934

s =32.186 km/h

d=32.186^{2}  / (250 * 0.8)

d= 5.18m

7 0
3 years ago
Other questions:
  • In 3–5 sentences, describe the unique challenges e-mail presents for business communications.
    13·2 answers
  • Which option helps you choose the design of a slide in a presentation?
    10·1 answer
  • Jeremy is typing a term paper on his computer and saves it every five minutes or so for good measure. which of the following bes
    11·1 answer
  • This is not an appropriate business use for a wiki. editing corporate documents getting customer feedback project management pub
    11·1 answer
  • What do we call the time it takes for all of the sub-pixels on the panel to go from pure black to pure white and black again
    6·1 answer
  • Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:
    6·1 answer
  • ______ is/are the replacement of human operation and control of machinery with some form of programmed control.
    11·1 answer
  • In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
    14·2 answers
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!