1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
2 years ago
11

What role do play in medicine ​

Computers and Technology
1 answer:
vaieri [72.5K]2 years ago
7 0

Answer: Thus the responsibilities of medicine are threefold: to generate scientific knowledge and to teach it to others; to use the knowledge for the health of an individual or a whole community; and to judge the moral and ethical propriety of each medical act that directly affects another human being

Explanation:

You might be interested in
After earning a learners license what test must be successfully passed to earn an operators license in Florida
Monica [59]
After earning a learners license , the <span>test that must be successfully passed to earn an operators license in Florida is: the driving skill test
The diriving skill test is a set of procedure that all learners must follow in order to determine the learners' ability in driving motor vehicle and test learner's understanding about traffic rules.</span>
5 0
3 years ago
Enables you to temporarily hide all the open windows except the one you are viewing.
solniwko [45]
Minimizing the other windows or full screen the one your looking at with F11 button
7 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
2 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain
Zinaida [17]

Answer:

Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO.

3 0
2 years ago
Other questions:
  • Why is soccer the most popular sport
    7·2 answers
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • 2. Because technology is always changing, there are new applications being developed constantly. (1 point)
    9·2 answers
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • Which of the following are agricultural industry clusters? Human population systems, computer technoloy biotechnology or food pr
    9·1 answer
  • public class Test { public static void main(String[] args) { try { method(); System.out.println("After the method call"); } catc
    12·1 answer
  • What are the optional parameters when configuring DHCP
    14·1 answer
  • What will you better be prepared for by learning about the animals you photograph
    11·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • Creating a Venn diagram takes specialized computer software.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!