1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
11

A great way to avoid tech distraction is to __

Computers and Technology
2 answers:
Ksivusya [100]3 years ago
4 0

Answer:

B

Explanation:

This is because you are only restraining yourself from using your phone when you are NOT at the stop lights (or you could perhaps say Red Lights). I hope this was helpful! :)

Leokris [45]3 years ago
3 0

Answer:

The correct answer is A.

You might be interested in
WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
pishuonlain [190]

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

8 0
3 years ago
Read 2 more answers
What is the term for a problem in your code
Anna71 [15]

Answer:

bug

Explanation:

Bug

a problem in your code

7 0
3 years ago
Read 2 more answers
What is Tesla BEST know for designing this? ANSWER
Aleonysh [2.5K]

Answer:

  1. tesla coils
  2. tesla
  3. edison
  4. x ray
  5. slinky
  6. time travel
  7. he spent it
  8. blue tooth

Explanation:

3 0
3 years ago
What is computer hardware?
faltersainse [42]
Computer hard ware is any thing physical that you can touch such as the mouse , keyboard hard drive cpu, moniter or if your using a laptop it will be the entire computer its self.
5 0
4 years ago
Read 2 more answers
Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
LUCKY_DIMON [66]

Answer: Remote Access Trojans (RATs) is the malware that is used by the hackers to attack the computer and operating system remotely.The working of RATs is done by download the malware and executing it to create a server .After the server is created ,hacker sends this server along with a crypter to eliminate the antivirus program's function present in the user's system.

Thus, RAT gets invoked in the system of the user and the hacker can control the user's system .Attacker can hack the complete functioning of the user's system and can steal, destroy ,execute etc any confidential data and application.

The user or the network administrator can get to know about the RAT's activity by steps like checking the open port, checking the activities through Task Manager of Windows, observing any unusual activity and appearance of the display screen etc.

4 0
3 years ago
Other questions:
  • Draw the cache tables and the state of all bits within them. Suppose you have a 16 byte cache with 2 byte long cachelines that i
    6·1 answer
  • Susan needs to change the color scheme in all the slides of her multimedia presentation. The presentation software program Susan
    10·2 answers
  • Which remote assistance option requires peer name resolution protocol (pnr) and ipv6?
    5·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • Which function returns a valid value without any arguments?
    13·2 answers
  • Disk ___________________ helps improve the speed and efficiency of a hard disk.
    6·1 answer
  • Write a algorithm to attend birthday party​
    8·2 answers
  • During the conflict resolution process, which of the followings statements would be appropriate when defining the problem?
    11·2 answers
  • Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a l
    5·1 answer
  • Which statement creates a StudentIDs object given the following code: public class StudentIDs> { private TheType item1; priva
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!