1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
9

2. Always look out for animals, especially at

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
6 0

Answer:

At night, dusk and dawn is the most probably time to look out for animals

Explanation:

Intersections: at road intersections you should be looking out for vehicles or humans crossing to avoid collisions

railroads: you should be looking out for oncoming trains to avoid collisions as well

Night, dusk and dawn:  a lot happen at this times because visibility is extremely poor at this times and animals tend to move around by this times unnoticed so you should be more careful at this times and lookout for both human and animals

2:00 pm : this is in the thick of the day and you don't have to lookout for animals by this time  

poizon [28]3 years ago
5 0
The answer to this question is b, railroad crossings.
You might be interested in
Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies
Mazyrski [523]

Answer:

def language(mystring, n):

   if n > 0:

       string_list = [x for x in mystring]

       string_cont = ""

       for character in string_list:

           string_cont += character * n

       print(string_cont)

Explanation:

When n is equal to 0, that is, n=0, The python program multiplies the characters of the string "mystring" by the integer variable "n" to output a string with all characters with the same count.

7 0
3 years ago
What are three special purpose devices you might find in a data center and what do they do?
Alinara [238K]
The <span>three special purpose devices one might find in a data center and what they do are : 
</span><span>1) Load Balancer</span><span> is a device that acts as a reverse proxy and distributes network or application traffic across a number of. servers.</span><span>
2) Logical Servers are logically separate servers (e.g., a Web server, an email server, and a file server) on the same physical computer. 
</span>3) V<span>irtual Servers ran on the same physical computer </span>that shares hardware and software resources with other operating systems (OS), they are popular in Web hosting environments.
6 0
3 years ago
100 POINTS!!!!
Alisiya [41]

Answer:

☆<em>intellectual property</em>☆

<u>intangible </u><u>a</u><u>s</u><u>s</u><u>e</u><u>t</u><u>s</u><u> </u><u> that result from intellectual</u><u> </u><u>p</u><u>r</u><u>o</u><u>p</u><u>e</u><u>r</u><u>t</u><u>y</u><u> </u><u>.</u>

<u>☆</u><u>I</u><u>n</u><u>t</u><u>a</u><u>n</u><u>g</u><u>i</u><u>b</u><u>l</u><u>e</u><u>☆</u><u>;</u>

<u>s</u><u>o</u><u>m</u><u>e</u><u>t</u><u>h</u><u>i</u><u>n</u><u>g</u><u> </u><u>t</u><u>h</u><u>a</u><u>t</u><u> </u><u>c</u><u>a</u><u>n</u><u>n</u><u>o</u><u>t</u><u> </u><u>b</u><u>e</u><u> </u><u>t</u><u>o</u><u>u</u><u>c</u><u>h</u><u>e</u><u>d</u><u>.</u>

<em>P</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>M</em><em>a</em><em>r</em><em>k</em><em>☆</em>

<em>A</em><em>r</em><em>i</em><em>a</em><em>♡</em>

5 0
3 years ago
On CLIENT3, open Windows Explorer as Administrator. Open properties for C:\Program Files and select the Security tab to view the
defon

Answer:

1). Read & execute

2). List folder contents

3). Read

Explanation:

See image

5 0
3 years ago
Which key retains its uniqueness even after you remove some of the fields?
Natasha_Volkova [10]

Answer:

Primary key retains its uniqueness even after you remove some of the fields.

Explanation:

I am assuming that this question is related to database. Therefore, I am answering it according to database context.

In database, you can have multiple rows and columns. Each column shows a specific attribute while each row plots the data according to the attributes. However, there is the first column of each of main table that has unique set of values. It is called the Primary Key. Some key features of primary key are:

  • It always contains the unique value.
  • Its value cannot be null.
  • A table can have at max one primary key.
  • It can be the combination of multiple columns but it must be unique.

Therefore, the primary key has the ability to retain its uniqueness even after you remove some of the fields.

8 0
4 years ago
Other questions:
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • Which of the following symbols is used to convert a number to text?
    11·1 answer
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • While inserting images, the Picture command is usually used to insert photos from a digital camera, and the Clip Art command is
    7·2 answers
  • Convert the following 8­bit binary numbers in two's complement format to decimal (If the number is negative, include the minus s
    5·1 answer
  • Why is it important to recognize web adress endings ?
    13·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • When a laptop internal device fails, what three options can you use to deal with the problem?
    7·1 answer
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • On what aspect of digital media do people often focus on at the expense of the important supporting roles?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!