1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
4 years ago
12

LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:

Computers and Technology
2 answers:
AleksandrR [38]4 years ago
7 0
The answer is A. D could be true, but if you have green, they would have a red hand, and not right-of-way
KATRIN_1 [288]4 years ago
6 0
A <span>Other vehicles might enter the intersection against a red light.</span>
You might be interested in
Adjectives to describe programming skills
Ronch [10]

Answer:

Here are some adjectives for programmer: archetypal `real, ultimate navigational, former lucid, one-year-old professional, year-old professional, media-friendly genetic, inevitable seven-year, >gical, adgical, ever silent and phlegmatical, silent and phlegmatical, ]real, extremely defensive, and brilliant cryptographic.

8 0
3 years ago
Is monitor is a television​
mylen [45]

Answer:

No, a monitor only shows what a different device tells them too however, a tv can be connected to nothing and show tv shows

3 0
3 years ago
"HotelExp” is a 3-D range name applied to the workbook shown.
Ganezh [65]

Answer:

all cells in the B column of any worksheet in this workbook

Explanation:

It seems each worksheet covers total expenses for each month, and hence workbook must have 12 such with one month for each worksheet. Also, the 3D range is a special option in Excel to reference all cells or a selected group of cells for all the worksheets. However, it should be all B cells as B2: B4 apart from this, others in B column also has expenses. And hence, the above option is the correct one.

3 0
3 years ago
Match the description to the step in troubleshooting.
Digiron [165]
It should go 4 5 3 2 1
5 0
4 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Other questions:
  • You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has d
    15·1 answer
  • The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produ
    11·1 answer
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • 1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has
    14·1 answer
  • Who the heII is apsiganocj
    14·2 answers
  • Which model represents any process in general?
    6·1 answer
  • This component is responsible for the logical order of processing?
    11·1 answer
  • Can some one help me answer this question plz
    8·1 answer
  • What type of programing code do game developers use.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!