1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
12

Write a police description a person who know you well​

Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
3 0

Answer:

I will be describing Jude. He is a neighbor.

Explanation:

A police description refers to the method of describing a person using high-level detailing. An example is given below:

  1. He is a Five feet-three male caucasian
  2. With brown eyes and
  3. an Australian accent
  4. He has a military haircut
  5. About 38 years
  6. Weighs about 95Kg
  7. and dresses casually
  8. he walks with a slant to the left
  9. a dove tattoed at the back of his neck
  10. and a birthmark on his left ear lobe

Cheers

You might be interested in
Which of the following are valid values for a String? (Select all that apply)
Ilya [14]

Answer:

"false" "PK fire" "17"

Explanation:

Strings are any values wrapped in speech marks.

6 0
4 years ago
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
aleksley [76]

Answer: Spread spectrum

Explanation:

In spread spectrum the data to be transmitted is spread over a wider bandwidth rather than fixed bandwidth.

4 0
4 years ago
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
Which adaptation of eap utilizes eap-mschapv2 inside of an encrypted tls tunnel?
cluponka [151]

Main Answer:

<h3>which adaptation of eap utilizes eap mschapv2 inside of an encrypted tls tunnel? <u>protected (EAP)</u></h3>

sub heading:

what is meant by protected( EAP)?

Explanation:

1.The protected extensible authentication protocal also known as protected (EAP).

2.transport layer security tunnen

Refference link :

https//brainly.com

Hashtag:

#SPJ4

7 0
2 years ago
A technician is about to open a desktop PC to replace a video card. He shuts down the computer, opens it, grounds himself with t
AnnyKZ [126]

Answer:

Disconnect the power cable?

Explanation:

4 0
2 years ago
Other questions:
  • Suppose a program is running on a distributed-memory multiprocessor. There are 1,000 instructions in the program and 80% of inst
    13·1 answer
  • What government agency initially began the work with computers that would eventually lead to the development of the Internet?
    5·2 answers
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • Which type of server runs Active Directory?
    12·1 answer
  • MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations
    6·1 answer
  • In python
    9·1 answer
  • Complete the function to return the factorial of the parameter using recursion,
    10·2 answers
  • What adaptation Judy and her parents have that help them run from predators coming?​
    6·1 answer
  • In the previous project, you are storing the first name of the gamer. Write a phrase to the game right before the first word wit
    6·1 answer
  • Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!