1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
10

If u have a best friend who backstabs u in the back and u known her every since u was 5 years old what do u do

Law
2 answers:
Mice21 [21]3 years ago
7 0

Answer:

f88k them off and if they used you do the same back but it all depends on how he/her betrayed you though...

Explanation:

aleksley [76]3 years ago
5 0
Drop them. . . . . . . . .
You might be interested in
What do you think juvenile courts will be like in 20 or 30 years?
dlinn [17]

Answer:

More leaning towards trails like adults depending on the crime committed.

Explanation:

7 0
3 years ago
3. Magandang damit
riadik2000 [5.3K]

Answer:

do the challenge in brainly it gives u points !!!!

Explanation:

7 0
3 years ago
10 When your ability to divide your attention is impaired, the chances of being involved in a collision increase. A BAL as low a
Black_prince [1.1K]
.08 is the legal BAC
5 0
3 years ago
Read 2 more answers
Which of these describe a participating life insurance policy?​
nikdorinn [45]

Answer:

4

Explanation:

recaude you cant is plain and orher stuff

7 0
3 years ago
Computer Forensic Investigators do not need to consider ______________when packaging and transporting evidence.
Nataly_w [17]

Answer: check explanation.

Explanation:

Computer Forensics involves the techniques used in gathering evidence from a particular computing device. The evidence gathered from computer Forensics should be suitable for presentation in a law court.

Computer Forensic investigator need to consider some properties such as the corrosive elements, static electricity, temperature and the magnetic field when packaging and transporting evidence.

Computer Forensic investigators follow set of procedures for their analysis;

(1). physical isolation of the device in question so as to make sure it cannot be contaminated accidentally, and (2). digital copy of the device's storage media should be made and locked in a secure facility.

7 0
3 years ago
Other questions:
  • To follow the truth is our responsibility​
    10·2 answers
  • What force young children to go on streets to star live there
    15·1 answer
  • 2+2 is __ - 1 thats free quick _____<br> if you get it right you get brainlest
    12·2 answers
  • What is an example of how a crisis response team might help a community in crisis after a violent crime?
    10·2 answers
  • Outline current crime and disorder legislation
    11·1 answer
  • What is the law that protects poor service delivery​
    8·2 answers
  • "Pro-death" is a loaded phrase? T or F
    8·2 answers
  • Please help with this question
    15·2 answers
  • Question got deleted, what is eminent domain?
    13·1 answer
  • Người vi phạm hành chính thì bị xử lý hành chính đúng hay sai tại sao
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!