1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
8

PLEASE HELP ASAP I WILL MARK AS BRILLIANT

Computers and Technology
1 answer:
Natali [406]3 years ago
6 0
1) Irresponsible behavior.
2) Using a password-protected website and making sure only specific friends can see it.<span>
</span>3) Posting offensive pictures is disrespectful of the feelings of others.
4) Mark posts his e-mail address to gain access to a dozen online gambling sites.
You might be interested in
1)Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "positive" otherwise. Examp
SSSSS [86.1K]
1. userVal < 0 ? "negative" : "positive"

2. updateDirection == 1 ? numUsers++ : numUsers--;
7 0
4 years ago
Read 2 more answers
Which of the following statements is true of intrapreneurs
chubhunter [2.5K]

<u>Answer is:</u>

They take risks, but not with their own investments.

<u>Explanation:</u>

Intrapreneurship is the act of behaving like an entrepreneur while working within a large organization. Intrapreneurship is known as the practice of a corporate management style that integrates risk-taking and innovation approaches, as well as the reward and motivational techniques, that are more traditionally thought of as being the province of entrepreneurship.


<u>Example:</u>

One of the most well-known examples of intrapreneurship is the "Skunk Works" group at Lockheed Martin. The group was originally named after a reference in a cartoon, and was first brought together in 1943 to build the P-80 fighter jet. Because the project was to eventually become a part of the war effort, the project was internally protected and secretive. Kelly Johnson, later famous for Kelly's 14 rules of intrapreneurship, was the director of this group.

4 0
4 years ago
To deny traffic destined to a specific tcp port you will need to apply a __________ access control list.
Fiesta28 [93]
The correct answer for the fill-in-the-blank is [user]3
4 0
4 years ago
After the recursive sorting step, ____ does not need to combine the sorted sub-arrays.
loris [4]

After the recursive sorting step, merge sort does not need to combine the sorted sub-arrays.

<h3>What is merge sort?</h3>

Merge sort is an efficient, general-purpose, comparison-based sorting algorithm in computer science.

Most implementations yield a stable sort, which means that the order of equal elements in the input and output is the same.

Merge Sort can be used to sort linked lists. Merge Sort is a stable sort, which means that the same element in an array retains its original position in relation to the others.

Thus, a merge sort does not need to combine the sorted sub-arrays after the recursive sorting step.

For more details regarding a merge sort, visit:

brainly.com/question/13152286?referrer=searchResults

#SPJ4

6 0
2 years ago
Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
Pavel [41]
I think it is a Polymorphic Virus
7 0
3 years ago
Other questions:
  • Which type of network medium is used by an integrated services digital network adapter?
    14·1 answer
  • Many people view drug and alcohol abuse as a social problem.<br> A. TRUE<br> B. FALSE
    9·1 answer
  • A network administrator wants to have the same network mask for all networks at a particular small site. The site has the follow
    11·1 answer
  • Two technicians are discussing MAP sensors. Technician A says that the MAP sensor should be replaced if anything comes out of th
    10·1 answer
  • Number the steps to describe how Tristan can complete
    6·2 answers
  • Help!! Best answer will get Brainliest!!
    10·2 answers
  • Raman will perform in pune tomorrow(simple past)​
    11·2 answers
  • It is the "executable" phrase of Word<br>Wide Web with dynamic applications,?<br>​
    9·1 answer
  • Write a C console application that will be used to determine if rectangular packages can fit inside one of a set of spheres. You
    5·1 answer
  • You need to select the text / picture /shape before you can Hyperlink.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!