1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
2 years ago
9

Topic: Drivers ed 100 points and brainliest!

Computers and Technology
1 answer:
ddd [48]2 years ago
3 0

Answer: Ill explain it!

Explanation: Modern technology is extremely beneficial to drivers because the modern cars have sensors that detect the range of other cars, when they stop and you might not see or be ready for it, your car will slam the brakes for you, this alone saves many lives. Another is like a Tesla with autopilot. Lets say for example one day your really sleepy or dont feel good, its a stress to keep the car straight. You could turn on autopilot and it could assist you with your driving, and their system has shown to be for the most part very beneficial and responsive. I would say another would be cameras above traffic lights watching for speeders and getting their license plates. This is important because people who are being risky and causing hazards on the road will get a fat ticket and will be seeing court. They are less likely to run a red light if they see a camera watching. I hope this helps you!

You might be interested in
4. How do artistic designing and engineering designing differ? How do they overlap?
zhannawk [14.2K]

Answer: design is art, art is design.

Any good artist is designing their work. Any good designer has an art to their work. The artist "designs" the composition of any piece they create, be it a painting, sculpture, furniture, etc. There is design even in a child's drawing.

Explanation:

6 0
3 years ago
Given the number of rows and the number of columns, write nested loops to print a rectangle. (PYTHON)
Allushta [10]

Answer:

Explanation:

Please see the attached picture for help.

6 0
3 years ago
Read 2 more answers
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
why is it when you put earbud aux cords in a phone or computer they sound weird until you move the aux cord? Then it is somehow
AfilCa [17]

Answer:

that might just be the headphone cord itself or it might be the port on the pc/phone

Explanation:

i had this happen with my old droid razr hd i thought it was the aux cord on my speaker and head phones but i used the same things on a friends phone and they worked just fine and this might be do to an old  or broken port on the phone /c my phone headphone port got used almost everyday and it was just the port you can replace this on some tech or you could just use bluetooth if the tech doesent have it buy and adapter.

            hope this helps!!!

4 0
3 years ago
Other questions:
  • "Different links can transmit data at different rates, with the _______ of a link measured in bits/second"
    11·1 answer
  • A ____ appearing in the main text of a document indicates a footnote or endnote.
    15·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • 1 megabyte is equal to 1024 gigabyte. True/False​
    11·2 answers
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
    13·2 answers
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • 9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!