1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
2 years ago
12

True or Fale A criminal defense attorney's main focus is to convict the accused of a crime, and a state prosecutor is to defend

the accused of the crime
Computers and Technology
2 answers:
Veseljchak [2.6K]2 years ago
6 0

Answer:

true i guess......

Explanation: sorry if this is wrong

Natali5045456 [20]2 years ago
3 0
A state prosecutor accuses someone in the magistrates’ court on behalf of the state, whilst a criminal defense attorney defends their client against accusations and will try to negotiate deals with their opposer (prosecutors) this could include; reduced bail, reduced sentences, and reduced charges. The answer is false. Keywords; DEFENSE, and PROSECUTOR
You might be interested in
Combination of star topology and star topology can consider as hybrid?​
Ad libitum [116K]

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

4 0
3 years ago
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
2 years ago
Items that represent features of smartphones apps
Anestetic [448]
I believe they are icons.
8 0
3 years ago
What
AveGali [126]
Answer: Computers and cellular devices
Reason: Everyone every day watched entertainment with commercials of the internet all day on these technologies and proven by 92 percent. Make this brainly answer for everyone else that needs this. Hope this helps:)
8 0
3 years ago
Answer in python code:
katovenus [111]

Answer:

a

Explanation:

sxcvbnm,mnbvcxzzdfghjkjhgfdssd54567uhgft

7 0
2 years ago
Other questions:
  • Why was Unicode invented?
    6·1 answer
  • 25. Becca is learning how to brush her teeth independently and her therapist/RBT has created an activity schedule to help teach
    6·1 answer
  • Plugging in a cable is a good troubleshooting technique. <br> True or false
    5·1 answer
  • Wireless network devices use ________ to communicate with each other.
    9·2 answers
  • Give an example of an input device, an output device, a storage device, and a networking device.
    10·1 answer
  • The mods have peanuts for brains (it's true, I lost like 1k points to them for no reason)
    12·1 answer
  • Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
    5·1 answer
  • The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
    7·1 answer
  • A special type of loans for houses
    9·2 answers
  • What line of business (L'Oréa)?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!