1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
5

A burglar alarm company's advertisements show images of women's homes being broken into. What stereotype is promoted by these ad

vertisements?
A. that women are strong
B. that women are ignorant
C. that women are vulnerable
D. that women are courageous
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
5 0
C. that women are vulnerable
OLga [1]3 years ago
5 0
The Answer would be C. that women are vulnerable.
You might be interested in
Which statement best describes a social impact of computing on the world?
DiKsa [7]

Answer: Smartphones have changed the way people communicate through text messages and emojis.

Explanation:

it would only make sense that this is the correct answer because globally smartphones are used for communication, considering the fact that we dont tend to write letters to people across the country as our main source of communication, or in a different continent all together. The steady growth of technology has clearly made getting in touch with people of all nations much easier.

3 0
3 years ago
Which term is used to mean the methods of a predator uses to befriend youth online?
sammy [17]
Pretty sure its called the grooming process

6 0
3 years ago
Read 2 more answers
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
When attaching a file or files in outlook 365 you select the attach command and then select the files location
mamaluj [8]

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

3 0
3 years ago
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
Other questions:
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    14·1 answer
  • Which options correctly describe Andrew's job role?
    6·1 answer
  • What type of product does amd manufacture
    5·1 answer
  • While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea
    14·2 answers
  • This needs to be written in Java.
    11·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • What are finger nails made of?-
    12·2 answers
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • The executive ________ is the person ultimately responsible to their company for the project's success.
    13·1 answer
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!