1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
8

Risk taker positive or negative​

Computers and Technology
1 answer:
ratelena [41]3 years ago
7 0

Explanation:

I think risk taker are <em>positive</em><em>.</em>

You might be interested in
The ____________ is the number of rectangles an image has in a square inch.
miv72 [106K]
D size




Read more




































Hope,this helped
7 0
3 years ago
Read 2 more answers
Please help me I don’t know what I’m doing wrong.
Alinara [238K]

Answer:

Explanation:

I noticed the \n, \n will cause the new line break, delete it.

try code below:

<em>System.out.println(" " + " " + "NO PARKING");</em>

<em>System.out.println("2:00 - 6:00 a.m.");</em>

5 0
2 years ago
Write a statement that declares a prototype for a function printArray, which has two parameters. The first parameter is an array
Savatey [412]

Answer:

void printArray(int [],int);

Hope this helps!

4 0
3 years ago
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you
love history [14]

Answer:

Make every attempt to recover the data

Explanation:

If your decide to format the drive, use system restore or reinstall the windows OS you may end up loosing all your data so the best option is to try as much as you can attempting to recover the data because the data might or definitely will be lost while using other options you think are available.

8 0
3 years ago
What guidance identifies federal information security controls?
Vladimir79 [104]

Answer:

<u>FIPS</u> <u>Publication</u> <u>2</u><u>0</u><u>0</u>, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
Other questions:
  • When creating an input control (for example, a button) on a form the _____________ indicates the data that is contained in the n
    13·1 answer
  • A _________ is the broadcast of various types of media over the web.
    10·2 answers
  • 3. What type of error is in the following sentence? "George W. Bush is the President of the United States of
    5·1 answer
  • What phrase best describes the overall structure of the<br> passage
    9·1 answer
  • The computer mouse is used to
    11·1 answer
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • What is best defined as a phishing email that is targeted directly at you?.
    14·1 answer
  • Can anyone figure this out???? I need help ASAP!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!