1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
3 years ago
6

Discuss the causes ,symptoms, preventive measures and treatment of AIDS​

Computers and Technology
2 answers:
Svetlanka [38]3 years ago
8 0

Answer:

AIDS can be caused by having sexual intercourse with an AIDS-infected partner. It can only be spread through the contact of infected blood or fluid from a mother to child during childbirth.

There are many symptoms of AIDS. However, these are the most common symptoms of AIDS:

  1. Swollen lymph glands
  • Most of the white blood cells are produced there.

2. Weight loss

3. Diarrhea

There are many measures that can be put in placed to prevent AIDS.

  1. To use a condom during sexual intercourse.
  2. Making sure that needles are not shared with others (e.g. when piercing your ear). The needles may be contaminated by an AIDS-infected user. Use a clean needle.
PilotLPTM [1.2K]3 years ago
8 0

Answer:

Explanation:aids

You might be interested in
04. Suppose a computer program needs to sort a list of student records in ascending order
34kurt

Answer:

D) ["Kathy Bones", "Jill Brewer", "Joe Schnook", "Tom Smith"]

Explanation:

The context of the problem explains a computer program that sorts names in "ascending order" (A to Z) since the ASCII table has capital A start a lower number and it increases from there to capital Z.

Notice how the attached file, which is a portion of the ASCII table, shows that letters after A are also higher in decimal value than the previous letter.

With this in mind, we know that all this program does is sort by last name alphabetical order. From there, just sort the given names using that same criteria, last name alphabetical order, and the correct answer is determined.

<em>Please put "Brainliest" on my answer if it helped you out!</em>

<em>If you want to learn more about this subject, you can search:</em>

<em>- ASCII Table</em>

<em>- Lists in Programming</em>

<em>- Sorting Procedures</em>

7 0
2 years ago
HINTS;
ExtremeBDS [4]
Good job! please mark as branliest?!
4 0
2 years ago
I got a kahoot! Totally random pls join!<br><br> Code 08408519!
OlgaM077 [116]

Answer:

say less

Explanation:

5 0
3 years ago
Read 2 more answers
Why is the OSI reference model useful?
sveticcg [70]
The answer to this question is B.

3 0
3 years ago
Key Categories: more libraries and thousands of functions
stich3 [128]





b. power
YOUR WELXOME



4 0
3 years ago
Other questions:
  • Consider the following code:
    13·1 answer
  • Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
    6·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    12·2 answers
  • DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
    6·1 answer
  • Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
    8·1 answer
  • Por que se dice que la tecnología ha tenido muchos aportes positivos para la sociedad pero también nos ha hecho dependientes de
    9·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • Which objects appear on the slide after she clicks ok? Check all that apply.
    5·2 answers
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!