1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
15

PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you

would utilize to adjust your driving and lower your risk?? ​

Computers and Technology
1 answer:
JulsSmile [24]3 years ago
7 0
1.Slow down 2. Break earlier
You might be interested in
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
Sveta_85 [38]

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question attachment file is missing so, following the code to this question:

using function IF:

=IF(Logical test, how to do it when testing is right, how to do it when testing is wrong)

In this scenario, a leader development Worker should pass 2 tests

In the First test may not finish his training

If yes-" satisfied"  

It is not true, it will go to 2nd test  

In the second test, If employee served a service period of even more than 1 year (to be performed in a first check if not correct)

If, It is yes=" yes"  else  not ="No"  

= IF(Leader Training = Yes, "Completed," IF(Service time> 1," Yes ","No")  

That's means,  

The sort IF(I2 = "Yes","Completed"),IF(D2>1," Yes","No") must be used in cell M2)

Copy Cell M2 Then the selected M3 over M30

8 0
4 years ago
How do i build a supercomputer.?
stira [4]
You will need one head node, at least a dozen identical compute nodes, an Ethernet switch, a power distribution unit, and a rack. Determine the electrical demand, cooling and space required. Also decide on what IP address you want for your private networks, what to name the nodes, what software packages you want installed, and what technology you want to provide the parallel computing capabilities
3 0
3 years ago
The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym
Juli2301 [7.4K]

Answer:

num = int(input("enter a number:"))

print(num * 8)

Explanation:

num is just a variable could be named anything you want.

if code was like this num = input("enter a number:")

and do a print(num * 8)

we get an error because whatever the user puts in input comes out a string.

we cast int() around our input() function to convert from string to integer.

therefore: num = int(input("enter a number:"))

will allow us to do  print(num * 8)

6 0
4 years ago
When you select the data range for a pie chart, you should be sure to include the total cell on the worksheet?
Daniel [21]
This is not a question...
5 0
3 years ago
Other questions:
  • You will write a program that reads a binary file that contains records of creatures. Each record can be stored in a Creature st
    10·1 answer
  • Why should you thank the customer after resolving an issue?
    7·2 answers
  • Which is a real-world example of a procedure?
    11·1 answer
  • Another html/css assignment, drop css code below, thank you
    15·1 answer
  • You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.
    6·2 answers
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • I live in Alabama and I’m ab to leave to go on a 3 week trip to France and I’m wondering how I can get LTE for my IPhone 6s Plus
    15·2 answers
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
  • the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!