1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
12

16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7

Computers and Technology
2 answers:
ElenaW [278]3 years ago
8 0
16 to 19 year olds are 2.7 times more likely to crash. 
Montano1993 [528]3 years ago
3 0
2.7 for 16+ years old
You might be interested in
A computer is made up of hardware and software ​
denis-greek [22]
Um well yeahhhhuhh lol
4 0
3 years ago
Wich is the correct process for selecting an entire row in a spreadsheet?
umka21 [38]
CTRL - (select sentence) - ALT

4 0
3 years ago
Vivian wants to increase the storage capacity of her computer. Which components should she upgrade?
Nikitich [7]

Answer:

Hard drive

Explanation:

The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.

4 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Help me out on question 29 and 30 please
Elanso [62]

Answer:

It 5

Explain

number 28 is A and number 29 is 5

5 0
3 years ago
Other questions:
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • According to Mintzberg's classification of managerial roles, the role of a(n) ______ is to transmit information received from ou
    7·1 answer
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding
    5·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • An IT professional with a customer-service
    13·1 answer
  • 3. Create mode was one of the most innovative and influential features of which of the following games?
    7·1 answer
  • What are 2 ways computers can connect to a network?
    5·1 answer
  • 45 points!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!