1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
5

__________ are the first line of defense against unsafe drivers.

Computers and Technology
1 answer:
vova2212 [387]3 years ago
5 0
Peace officers are the first line of defense against unsafe drivers. These officers are appointed for a specific purpose of upholding law and order, so they would be the ones who are there to help you in case of an accident caused by unsafe drivers. A peace officers is just another term for a law enforcement officer, or just the police.
You might be interested in
a customer is traveling to a branch office, and the network administrator provides her with a static ip address for her laptop.
ser-zykov [4K]

The customer traveling with a provided static IP address should assign the IP in the network adapter settings. Thus, option B is correct.

<h3>What is static IP?</h3>

The complete question is: A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address?

A) Run the command "ipconfig configure static"

B) Assign the static IP in network adapter settings

C) Switch the button from dynamic to static on her laptop

D) Disconnect from WiFi and use an Ethernet cable

E) Type the IP address into the browser

A static IP is a setup that is configured manually instead of the DHCP assigned setup. It is a constant and nonchanging IP setup that is used when working remotely.

In the network and sharing system, open the adapter setting and choose the appropriate adapter. Then choose the IPV 4 and check the current internet settings. Choose the desired IP address and then click the OK and save button.

Therefore, option B. static IP is assigned in the network setting option.

Learn more about static IP here:

brainly.com/question/18849429

#SPJ1

7 0
2 years ago
Total_coins = 0
Maslowich

The code statement that completes the program is total_coins = nickel_count + dime_count

<h3>How to complete the segment?</h3>

From the code segment, we have the following highlights:

  • total_coins is initialized to 0, at line 1
  • Inputs for nickel_count and dime_count are taken on lines 2 and 3
  • The last line prints total_coins

The above means that total_coins has not been calculated.

This is calculated using:

total_coins = nickel_count + dime_count

The above must be placed before the last line of the program

Read more about code segments at:

brainly.com/question/24833629

#SPJ1

<h3>Complete question</h3>

Complete the code segment to calculate the total number of coins

total_coins = 0

nickel_count = int(input())

dime_count = int(input())

print(total_coins)

8 0
2 years ago
What is a computer memory <br>​
Alex_Xolod [135]

Answer:

In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term memory is often synonymous with the term primary storage or main memory. An archaic synonym for memory is store.

5 0
3 years ago
Read 2 more answers
The activity spikes during black Friday sales in the holiday season but significant stress on a major retailers website what fea
Elza [17]

Answer:

My Nav is the right answer.

Explanation:

Net asset value (NAV) describes a fund's per part exchange value. NAV is calculated by separating the complete value of all the money and securities in a fund's responsibility, minus any mortgages, by the number of exceptional shares. The NAV estimation is necessary because it shows us how much one portion of the fund is worth.

4 0
3 years ago
Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
kodGreya [7K]

Explanation:

The main reason why is because regular users don't have permission to write to /etc. Assuming this is Linux, it is a multi-user operating system. Meaning if there are user-application configuration files within /etc, it would prevent users from being able to customize their applications.

6 0
4 years ago
Other questions:
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Page _____ refers to whether a page is laid out vertically or horizontally.
    12·1 answer
  • Code
    7·1 answer
  • A special symbol that is used as an underlining structure to an agenda
    5·1 answer
  • Which commands can be used to highlight a whole paragraph? Check all that apply.
    6·1 answer
  • A sequence of data values separated by commas can be made into a list by enclosing the sequence in what type of symbols?
    5·1 answer
  • Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
    13·1 answer
  • The variables xp and yp have both been declared as pointers to integers, and have been assigned values. Write the code to exchan
    6·1 answer
  • John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
    12·1 answer
  • The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!