1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
15

Many people in the United States will say that they have rights, however, the majority of those people do not know what those ri

ghts are. Pick three rights guaranteed to you by the Bill of Rights and explain how they effect your life.
Computers and Technology
2 answers:
Viktor [21]3 years ago
5 0

Answer:

Three of the rights guaranteed by the bill of rights would be freedom of speech, freedom of religion, and the right to bear arms. Freedom of speech lets me say what I need to or what but there are consequences to what I say. Freedom of religion allows me to practice any religion in the united states without it being illegal. The right to bear arms allows me to own a gun to hunt or protect myself when needed with a license or orange card.

Explanation:

8090 [49]3 years ago
3 0

Answer:

I think this answer would be...

Three of the rights guaranteed by the bill of rights would be freedom of speech, freedom of religion, and the right to bear arms. Freedom of speech lets me say what I need to or what but there are consequences to what I say. Freedom of religion allows me to practice any religion in the united states without it being illegal. The right to bear arms allows me to own a gun to hunt or protect myself when needed with a license or orange card.

You might be interested in
Which of the following is not an example malicious code<br> A.Trojan horse B.worm C.virus D.spygear
umka21 [38]
B would be the correct answer

7 0
3 years ago
Read 2 more answers
A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
nikitadnepr [17]

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.

255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.

Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255

7 0
4 years ago
Explain why a sound background in auto electricity and electronics is absolutely necessary if you are to troubleshoot
Fynjy0 [20]

the electrical system important for starting up your vehicle, but it is also important for keeping your vehicle running as you drive it. In addition, it is the electrical system that is also responsible for the functioning of things such as your headlights, your radio, and your dashboard

4 0
2 years ago
You should make sure to send a letter to the person who interviewed you
Delvig [45]

Answer

Is that really a question?

Explanation:

Ok I will

3 0
3 years ago
Read 2 more answers
What is alphuneric text not intended for calculation entered into a spreadsheet called?
Over [174]
It is called text or general.
7 0
3 years ago
Other questions:
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • What was bill gates first operating system he created?
    7·1 answer
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • 1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the
    7·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • Opportunities in nanotechnology apply broadly to many fields. Identify TWO areas of IT that may be impacted by its further devel
    6·1 answer
  • Which type of password would be considered secure
    5·2 answers
  • Complete the sentence
    6·2 answers
  • Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and
    10·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!