1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
13

Answer quick plzzz I only have 2 hours

Computers and Technology
2 answers:
Nana76 [90]3 years ago
8 0

Answer:

option 2

Explanation:

Amanda [17]3 years ago
6 0

Answer:

B. Kathy performs tasks common to the Engineering and Technology pathway and Sean and Joan perform tasks common to the Science and Math pathway.

You might be interested in
Explain how the organ systems work together to warm up the body on a cold day
Tatiana [17]

Answer:

Your body is to cold ,blood vessels in the skin contract , and blood flow to the extremities (arms and legs)slows . muscles contract and relax rapidly which generates  heat to keep you warm..

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-
RSB [31]

Answer:

Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Explanation:

Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

8 0
3 years ago
25 points
Mnenie [13.5K]

A code of ethics and professional conduct outlines the ethical principles that govern decisions and behavior at a company or organization. They give general outlines of how employees should behave, as well as specific guidance for handling issues like harassment, safety, and conflicts of interest.

5 0
2 years ago
Read 2 more answers
Which statements about organizing messages in Outlook 2016 are true? Check all that apply. The Categories function is used for g
xenn [34]

Answer:

A. B. C. F. G.

Explanation:

5 0
3 years ago
Read 2 more answers
"What Search Network text ad component provides up to three fields of 30 characters each?"
Alex_Xolod [135]

Answer:

The headline component is the correct answer.

Explanation:

The headline component provides their user a better experience to modify the text or fonts of the heading and simple text with that links which is inline to those pages that displaying the topics, articles and also the discussions. This is also used for the particular search network text and also for the google ads components. So, that's why the following option is correct.

7 0
3 years ago
Other questions:
  • A factory has a dedicated room just for computers. They are generally kept locked in the room and are never directly used by use
    5·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • 18. Using the same formatting elements and designs across slides in a presentation is important to develop?
    5·1 answer
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • All health information available on the internet is valid. <br> a. true <br> b. false
    6·1 answer
  • What is a computer and what is the work of it​
    5·2 answers
  • Outline the dangers arising as a result of using computers​
    12·1 answer
  • First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newlin
    6·1 answer
  • What represents a user’s specific preferences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!