1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
2 years ago
11

Please helpppppppppppppp

Computers and Technology
1 answer:
viktelen [127]2 years ago
6 0

Answer:

its D

Explanation:

The social worker likes to work with other people, so he/she might not like working alone.

You might be interested in
Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
madreJ [45]

Answer:

129 \frac{2}{?} 23.4. \div 164 \times 5y1 + . \\ .00487ggh

6 0
3 years ago
Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
Simora [160]

Answer:

Following is attached the code that works accordingly as required. It reads in characters from standard input and outputs the number of times it sees an 'a' followed by the letter 'b'. All the description of program is given inside the code as comments.

I hope it will help you!

Explanation:

6 0
3 years ago
How often should you change your car's oil?
allsm [11]

Most cars can go at least 5,000 miles before an oil change. “Change your car's engine oil every three months, or 3,000 miles.

6 0
3 years ago
Read 2 more answers
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
If there has been no change in the data regarding a specific person, place or thing, information about that person, place or thi
babymother [125]
I think it’s b false sorry if I was wrong
6 0
3 years ago
Other questions:
  • In the lan protocol architecture the _________ layer is responsible for detecting errors and discarding any frames that are in e
    13·1 answer
  • The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
    13·1 answer
  • The fraction 460/7 is closest to which of the following whole numbers?
    11·1 answer
  • Identify a stressor in your life. Conduct an internet search to locate at least two reliable sources of information on effective
    6·1 answer
  • Explain motherboard in detail
    14·2 answers
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • Mha lovers why do other anime lovers report mha lovers for not liking there anime?
    6·2 answers
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
  • , how do you make this user <br> XtraCrispyIzzy<br> 12 characters or less for microsoft?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!