1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
12

Why would Network Systems employees be employed by the government?

Computers and Technology
2 answers:
Ghella [55]3 years ago
8 0
Well knowing how the government is with security id go with A. as it makes a lot of sense unlike B and D and if they were looking for software the question would mention it
Lady_Fox [76]3 years ago
3 0

Answer:

correct answer A.) because they provide communications and data security

Explanation:

You might be interested in
Which command executed in Windows PE would transfer both the files and directory structure from one device to another device or
EleoNora [17]

Answer:

xcopy

Explanation:

xcopy (which stands for extended copy) command, was created to have several functions and ability to copy one or more folders, files or an entire directory from one location to another. It is more powerful than copy command that was seen in the first set of operating systems. It is currently being built into desktop operating systems and Microsoft windows server.

6 0
3 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
4 years ago
By default, PowerPoint ends a slide show with a black slide. <br> a. True<br> b. False
Dmitry [639]
True . Because Press " ESC " To Exit Off Of Slide . 
5 0
4 years ago
Read 2 more answers
Consider an online shopping portal that allows a customer to browse and purchase different products. There are distributed store
andrezito [222]

Answer:

Design a web page that automatically tracks the location to determine the language

Explanation:

8 0
3 years ago
What is a key consideration when evaluating platforms?
kotegsom [21]

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

7 0
3 years ago
Other questions:
  • Your website is currently at position 5 in organic search. On a monthly basis you currently get on average 5,432 clicks and 32 c
    7·1 answer
  • What will be the value of ans after the following code has been executed?
    10·2 answers
  • The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan
    11·1 answer
  • Conversion of a continuous stream of sound into a series of ones and zeroes that can be interpreted by computers results in
    12·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • Select the correct answer.
    6·1 answer
  • What type of device is the keyboard?<br><br> Output<br> Input<br> Monitoring<br> Software
    7·2 answers
  • How do i find the greatest common factor of two numbers?
    14·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!