1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
2 years ago
5

Intelligent transportation systems use GPS to Select all that apply.

Computers and Technology
1 answer:
Tasya [4]2 years ago
6 0

Answer:

There is nothing to select you did not add any options

Explanation:

You might be interested in
1What kind of rules protect everyone’s rights when we use each other’s content
Tanya [424]

Answer:

1. Copyright.

2. Songs and books.

Explanation:

A copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

For example, when an individual downloads a song owned by any record company without paying a purchase fee, it is a violation of copyright law.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work.

Hence, copyright is a kind of rules that protect everyone’s rights when we use each other’s content.

An intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence. Some examples of an intellectual property are songs, books, poems, technology, design etc.

3 0
3 years ago
Borrowing money affects both assests and owners equity. True or false?​
shtirl [24]
It should be true, hopefully I’m right
6 0
2 years ago
Para que se utiliza openoffice en la vida cotidiana?
Mama L [17]
OpenOffice se utiliza para organizar y presentar los datos o la información de otra manera.

espero y te ayude! : )
3 0
3 years ago
Read 2 more answers
most dialog boxes in windows programs requiring navigation follow a similar procedure. true or false.
vfiekz [6]
I believe that is true

Hope this helps!! :)

8 0
2 years ago
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
2 years ago
Other questions:
  • Write an algorithm whether the given number is positive negative or zero​
    5·1 answer
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • Calculate the performance of a processor taking into account stalls due to data cache and instruction cache misses. The data cac
    11·1 answer
  • This is pixlr
    6·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • NEED HELP FAST timed
    13·1 answer
  • Most scheduling algorithms maintain a run queue, which lists processes eligible to run on a processor. On multicore systems, the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!