1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
6

write two paragraphs (at least 5 sentences each) about what President Biden and Vice-President Harris plan to do during the firs

t 100 days while in office.
Computers and Technology
1 answer:
frozen [14]3 years ago
4 0

Answer:

writing one in comments bec i don't have time for both sorry

You might be interested in
An Oven Is Just A Spicy Refrigerator? Yes Or No??
Marianna [84]

Answer:

No

Explanation:They both have different actions

3 0
3 years ago
Read 2 more answers
This is an example of ______________ of variables:
Sedbober [7]

Answer:

Encapsulation is an example of variables

6 0
3 years ago
POINT BOOST:
stiv31 [10]

glenn

she's good what's your

8 0
2 years ago
Which type of document would be best created in Word?
givi [52]

Answer:

it would be Animation I declare

6 0
2 years ago
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
4 years ago
Other questions:
  • Help asap. 10 points.
    8·2 answers
  • The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
    9·1 answer
  • Which is a copyright
    5·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP
    12·1 answer
  • The "origin" of the cartesian plane in math is the point where x and y are both zero. Given a variable, origin of type Point-- a
    5·1 answer
  • 5.8.1: Modify an array parameter. Write a function SwapArrayEnds() that swaps the first and last elements of the function's arra
    14·1 answer
  • Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
    10·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!