1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
7

Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance

sirens. She concluded that an accident had occurred and people were injured. Which reasoning did Betty use?
A) analogical
B) deductive
C) inductive
D) abductive
Computers and Technology
2 answers:
enot [183]3 years ago
4 0
B or D are the options I would suggest.
Galina-37 [17]3 years ago
4 0

Answer:

Its (D) Abductive

Explanation:

did the assignment.

You might be interested in
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the
kherson [118]

Answer:

What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.

Explanation:

Solution

There are different network security strategy which is listed below:

Segment the network:

Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.

Test your infrastructure :

Testing infrastructure also very good technique.

Always we have to test our infrastructure whether threat is occur or not.

If any threat is happen we can detect that easily by testing our infrastructure.

Regularly update anti-virus software :

This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.

Frequently backup your critical data :

This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.

This is less costs and simple.

Change router default security settings :

Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.

6 0
3 years ago
Convert (520)10 into base 16​
kakasveta [241]
The base-10 value of 52010 is equal to base-16 value of 20816.
3 0
3 years ago
Read 2 more answers
SHOW ME SOME C++ TUTORIALS?
german
Google c++ tutorial. Cplusplus and Tutorials Point both have some good resources
4 0
4 years ago
Alcoholism is a chronic disease caused by a dependency on alcohol. Which signs point to alcoholism?
trasher [3.6K]

Answer:

You might experience temporary blackouts and at times memory loss for the short term.

Sudden change in mood, and facing irritability signs

Coming up with excuses for drinking like relaxing, stress, feel normal or deal with stress

keeping distance from friends and various family members

Drinking away from all and in privacy

Suffering from hungover while you are not drinking

Changing group or acquaintances and appearance you usually are with previously

Explanation:

Please check the attachment.

3 0
4 years ago
Read 2 more answers
Write a program that takes three numbers as input from the user, and prints the largest.
balandron [24]

Answer:

I'll be using python:

__________________________

a=int(input("Enter a number :"))

b=int(input("Enter another number :"))

c=int(input("Enter last number :"))

lis=[a,b,c]

sort=sorted(lis)

print("The largest number is:", sort[1])

___________________________

8 0
3 years ago
Other questions:
  • Checking tire pressure should be performed:
    11·2 answers
  • A well-diversified portfolio needs about 20-25 stocks from different categories is this True or False?
    6·2 answers
  • What Windows Server 2016 feature implements software-defined storage and is intended to make storage more versatile by making it
    11·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Which type of financial institution typically has membership requirements?
    14·1 answer
  • The objects that you place on master pages are called _____.
    6·1 answer
  • Can someone URGENTLY help me with my java code (I WILL GIVE BRAINLIEST)!? Ive been working on it for hours and its not working!
    12·1 answer
  • How did hitles rules in nazi germany exemplify totiltarian rule?
    10·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!