1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
5

A burglar alarm company's advertisements show images of women's homes being broken into. What stereotype is promoted by these ad

vertisements?
A. that women are strong
B. that women are ignorant
C. that women are vulnerable
D. that women are courageous
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
5 0
C. that women are vulnerable
OLga [1]3 years ago
5 0
The Answer would be C. that women are vulnerable.
You might be interested in
Describe four features of a well designed input screen
Sladkaya [172]

Answer:

A well design input screen should:1.Be titled2.Navigation aids should be used

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
Oxana [17]
A quick way to restore the arrow pointer after you have used it for drawing is to press the esc key.  The esc key is <span>used for any of the different </span>functions<span>, as to interrupt or cancel the current process or running program, or to close a pop-up window.</span>
7 0
3 years ago
Identify the potential impact to IT security of incorrect configuration of firewall policies and third- party VPNs
yan [13]

Answer:

why is it necessary to fight against social evils and problem

5 0
3 years ago
What is the main purpose of a DNS server?
Daniel [21]

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

3 0
3 years ago
What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of
Lerok [7]

Explanation:

There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.

Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.

7 0
3 years ago
Other questions:
  • If you want a user to enter exactly 20 values which loop would be the best to use
    12·1 answer
  • Where is the cell membrane located in cell that do not have cell wall
    7·2 answers
  • Write a main function to do the following: A. Declare an array of 20 strings. B. Create an input file for the file "poem.dat". C
    12·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • (True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would
    12·2 answers
  • When solving for K, when cell potential is known, what is one of the first steps to follow?
    8·1 answer
  • How are additional slides added to presentations? select all that apply
    10·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!