1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
8

I need help pls, in this code if add row for example :

Computers and Technology
1 answer:
tankabanditka [31]4 years ago
3 0
I thing is going project experiment everyone make plans and
You might be interested in
An important goal of biosecurity training is to: Prevent laboratory accidents that could expose personnel to hazardous agents. P
Anestetic [448]

Answer:

Educate laboratory directors on their role in providing a safe working environment.

Explanation:

A lab is an abbreviation for laboratory and it can be defined as a building that is equipped with scientific equipments and apparatus, which are used for performing scientific experiments, manufacturing of chemicals and drugs, research, testing and analysis of hypothesis in order to establish a theory.

Generally, laboratory scientists, technicians, students and anyone going into a laboratory are expected to obey the rules and regulations guiding the laboratory.

Hence, an important goal of biosecurity training is to educate laboratory directors on their role in providing a safe working environment.

6 0
3 years ago
Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
max2010maxim [7]

Answer:

if you push alt and f4 at the same time it will automatically put the right answer.

Explanation:

7 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
I know that this will be taken down for not being a real question but is anyone else not able to search for anything? I can type
Schach [20]

Answer:

Sameee

Explanation:

6 0
3 years ago
Which of the following is not a use of a hash function
soldi70 [24.7K]

Answer:

the answer would be there

Explanation:

7 0
3 years ago
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • What is the "host" in a typical email address?
    14·1 answer
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • Done through Block Py/ Python
    11·1 answer
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    12·1 answer
  • What term is used to refer to the merging of government services with information technology?
    11·1 answer
  • Define Indentation
    8·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!