1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marta_Voda [28]
2 years ago
15

According to the video, which tasks do Police Patrol Officers perform? Select all that apply.

Computers and Technology
2 answers:
krek1111 [17]2 years ago
4 0

Answer:

The answer is B, E, and F

Explanation:

iren2701 [21]2 years ago
3 0

2 helping lost children

5 enforcing traffic laws

6 completing paperwork

You might be interested in
Which key is used to indent the first line of a paragraph to the right?
Ivanshal [37]

That would be the tab key

4 0
3 years ago
Read 2 more answers
Software is the word for:
Bad White [126]
The answer is B. And Incase you were wondering D. Is hardware
5 0
3 years ago
Which of the following BEST describes an extranet?
zimovet [89]

Answer:

D. an Internet connection allowing outsiders limited access to a firm's internal information system

Explanation:

An extranet is a private network that allows partial access to a company's network to partners, services providers, and selected customers. It provides a secure way of information exchange between the business and its stakeholders. An extranet is comparable to a Demilitarized Zone (DMZ) in that it gives authorized parties access to needed services but not the whole network.

8 0
3 years ago
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
3 years ago
Other questions:
  • How many buttons does a gamecube controller have?
    7·1 answer
  • Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
    15·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • What three conditions must be satisfied in order to solve the critical section problem?
    13·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • How do I make my own extension for chrome?
    7·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Which describes the hypothesis of an experiment? the variable changed by the experimenter/ the quantity that must remain constan
    9·1 answer
  • Superclass in python explanation
    7·1 answer
  • Another term for the plot structure of the hero journey
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!