1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
12

LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
7 0
The answer is A. D could be true, but if you have green, they would have a red hand, and not right-of-way
KATRIN_1 [288]3 years ago
6 0
A <span>Other vehicles might enter the intersection against a red light.</span>
You might be interested in
What is probably the most revolutionary innovation since the printing press?
BARSIC [14]

Answer:

The Internet

Explanation:

Why? The internet has done twice if not thrice what the printing press has done. The printing press allowed for dissemination of information and knowledge to the population through its mechanical movable printing capability and speed of book publishing. However its reach was highly limited by the physical attributes of the machines and having to transfer books and papers in spreading them to certain destinations. This limitation has been eliminated by the internet as one is able to receive a book written today in seconds and not physically but through electronic means. In other words, information need not be transferred physically, also accessbility and cost of getting information has been highly improved with the internet.

7 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Jacinta registered herself on a social-networking site. She receives one or two emails every day about promotional offers as wel
Rainbow [258]
It would be Spam. . . . 

3 0
3 years ago
PLS HURRY!!<br> Look at the image below
MrRa [10]

Answer:

1. A function can use variables as parameters.

2. A function can have more than one parameter.

3. The definition of a function must come before where the function is used.

Explanation:

<u>The definition of a function can come before or after it is used</u> - I am pretty sure it cannot be placed after the function is being used. It should always come before it is used, so this statement is false.

<u>A function can use variables as parameters</u> - this is true, variables are just labels to hold data.

<u>A function can have more than one parameter</u> - this is true.

<u>A function must have a return value</u> - functions do not always have to <em>return</em> values. It could simply print, so this statement is false.

<u>The definition of a function must come before where the function is used</u> - As said earlier, the definition of functions must come before it is used/called. This statement is true.

Hope this helps :)

7 0
3 years ago
A _____ is used by a host to forward IP packets that have destination addresses outside of the local subnet.
My name is Ann [436]

Ip packets are forwarded using the default gateway that is being used by the host.

Explanation:

Ip packets are forwarded using the default gateway that is being used by the host, where it has placed their destination addresses on the outside of the local subnet. The default router is another representation of the default gateway. It is also known as the default router. The computer sends the packets to the default router when it wishes to send to any other subnet. In-network this device is being a point of access to the other networks.

3 0
3 years ago
Other questions:
  • Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho
    15·1 answer
  • You need to prevent the use of tftp through your firewall. which port would you block?
    9·1 answer
  • Name and describe the various features of the PC support pages of About.com.
    8·2 answers
  • _________ is critical to Amazon's success.<br><br> SCM<br><br> JIT<br><br> ERP<br><br> VMI
    9·1 answer
  • This is the thing that I don't understand why did they banned private chat like there are long-distance relationships, and frien
    13·2 answers
  • What is the best brand of folders
    13·2 answers
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • Help me find the difference between these logos
    10·2 answers
  • If I was to sort the months of the year in ASCENDING order alphabetically, which
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!