1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
7

What do you suggest for Father's Day?​

Computers and Technology
1 answer:
ololo11 [35]3 years ago
6 0
A gift or maybe something homemade that means something special to you and or you dad
You might be interested in
Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
Tpy6a [65]

Answer:

b. Fences, gates, monitored doors

Explanation:

The best defense is a good defense. A good security system is reliable and will provide you with a criminal-deterrent protection, detect intrusions, and trigger appropriate incident responses. It involves the use of multiple layers  of interdependent systems like protective guards, locks, protective barriers, fences, and many other techniques.

4 0
3 years ago
Read 2 more answers
A network ____ usually contains a computer, networked peripheral, or network device.
Archy [21]
Card
......... ......... ........
8 0
3 years ago
A(n) _____ bus enables the central processing unit (CPU) to communicate with a system’s primary storage.
Jobisdone [24]
An Address bus enables the cpu to communicate with a system's primary storage.
4 0
3 years ago
What will you better be prepared for by learning about the animals you photograph
krek1111 [17]

D. All of the above.

Makes the most sense! :3

6 0
3 years ago
Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch
Mice21 [21]

Answer:

A and D could work

Explanation:

they do basically does the same thing!!

8 0
4 years ago
Other questions:
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni
    11·1 answer
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • Which of the following is the correct order of the SDLC?
    14·1 answer
  • How can a professional association help you reach your career goals?
    5·1 answer
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • Which weakness of web sites to launch attacks does an sql injection technique exploit?
    15·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • Monster Collector
    7·1 answer
  • mary has access to certain resources because she is in the Research division of her company. She has access to other resources b
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!