1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
2 years ago
11

A kid running inside the room what is the reference piont​

Law
2 answers:
Anton [14]2 years ago
4 0

Answer:

running inside the room

jeka57 [31]2 years ago
3 0
The above answer is good
You might be interested in
What's your opinion of the probate process?<br>(it has to 2 sentences)<br>WILL GIVE BRAINLEYEST
givi [52]

Answer:

Explanation:

My opinion about the probate process is that it is beneficial even though it can be a long and tiring process. An official process ensures that everything happens fairly before the law which the probate process fulfills because, without an official process, the dealing of the deceased will get more complicated and murkier without the law stepping in.

5 0
2 years ago
Read 2 more answers
Please help (For MUN)
ivann1987 [24]

Answer:

A solution to locate and punish cyber intruders is to promote software capable of identifying the IP of intruder computers, that is, those that do not have an IP authorized by the software. This software must also be able to store unauthorized and therefore intrusive IPs.

Explanation:

DISEC is the acronym that refers to the Disarmament and International Security Committee, which is a UN department that deals with global disarmament issues, with the aim of promoting security and combating threats to world peace. It is extremely important that the files and work of the DISEC community, be restricted to people who work directly with this, for this reason, it is necessary that strategies are created that prevent cybernetic invaders from having access to any information in this sector. In this case, it would be beneficial to create software capable of identifying and storing the IP of attacking computers, allowing these attackers to be found and punished.

A computer's IP is an identifier of the computer, the network used for access and the location where access was made. By having the IP of invading computers, the UN would have access to the location of the users of these computers, being able to find and punish them.

3 0
3 years ago
The primary purpose of civil law is to
Brut [27]
Let me find out the quick answer
3 0
2 years ago
Read 2 more answers
Another name for legal penalties is
Kaylis [27]
The correct answer is c. Jail term
7 0
2 years ago
Read 2 more answers
Presidential appointments and treaties must be approved by
Sedaia [141]
The Vice President of the United States serves as President of the Senate and may cast the decisive vote in the event of a tie in the Senate. The Senate has the sole power to confirm those of the President's appointments that require consent, and to ratify treaties.
4 0
2 years ago
Other questions:
  • How does our Governor plan to close the achievement gap in education?
    14·2 answers
  • A country with poor infrastructure and an undeveloped industrial base can be called a _____ country. Foreign Aid and the U.S.: S
    8·2 answers
  • Who can a bill come from
    13·2 answers
  • If a law enforcement officer stops a vehicle for a violation and finds a front seat passenger, 17 years of age or
    7·2 answers
  • What is the stair tool in investigation​
    8·1 answer
  • HELP PLEAE<br><br> HOW PLAY AMOG US111
    9·2 answers
  • Text0345alko5616721Text0345alko5616721Text0345alko5616721Text0345alko5616721Text0345alko5616721Text0345alko5616721Text0345alko56
    9·1 answer
  • The
    14·1 answer
  • Please help.........
    10·1 answer
  • Describe the ways courts handle contracts for which a required license is missing.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!