1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
9

An important part of the development of transport is safety. how can you, when you get around in different ways, contribute to m

aking it safer on the roads
Computers and Technology
1 answer:
nika2105 [10]3 years ago
8 0

Answer:

I need help I don't get a this questions please asap?

Explanation:    Head-on collisions. Some simple solutions can help to reduce the risk of head-on crashes. ...

   Run-off road crashes. This is when a vehicle collides with a stationary object, such as a sign or lamppost, after leaving the road. ...

   Intersection crashes. ...

   Vulnerable road users. ...

   Much work to be done.

Aug 31, 2018

You might be interested in
How do I write my name in binary code?
Galina-37 [17]

Answer:

qUE

wHAT CODE

Explanation:

4 0
3 years ago
The user location is usually a city
castortr0y [4]
What do you mean but I think yes the user location is usually a city
4 0
3 years ago
What is Key benefit of using ram in a computer ?
photoshop1234 [79]
<span>Every computer has ram, its what starts it up, saves information and speeds up your pc, a good amount of ram is 4gbs. Hope this helps.</span>
7 0
3 years ago
Read 2 more answers
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
ira [324]

Answer:

Pluggable authentication modules (PAM).

Explanation:

These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.

6 0
3 years ago
In a three-tier client/server design, a middle layer processes the client requests and translates them into data access commands
kipiarov [429]

Answer: Software Application

Explanation: Application software is a group of programs that is designed for end users. While system software is made up of low-level programs that interact with computers at a basic level, application software is above system software and it includes applications like word processors and spreadsheets.

7 0
3 years ago
Other questions:
  • Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
    14·1 answer
  • What best compares potrait and landscape orientations
    6·1 answer
  • Your personality is that of everyone else
    15·2 answers
  • How do you recognize substances that have gone through physical or chemical changes?
    14·2 answers
  • lance measured 0.485 liter of water. Angel measured 0.5 liter of water. lance said, "My beaker has more water than yours because
    6·2 answers
  • In a batch operating system, three jobs are submitted for execution. Each job involves an I/O activity, CPU time and another I/O
    12·1 answer
  • You are a computer consultant called in to a manufacturing plant. The plant engineer needs a system to control their assembly li
    10·1 answer
  • What explains the discrepancy between the number of bytes you can
    13·1 answer
  • An international fast-food chain is looking for opportunities to leverage the Cloud to gain insights into customer data, includi
    10·1 answer
  • What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!