1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
14

What shooting position is commonly used when hunting with a shotgun?

Computers and Technology
2 answers:
amid [387]3 years ago
6 0
Standing well for me I never miss a shot in that position

SOVA2 [1]3 years ago
3 0
Hello
how is your day going

so the answer is going to be <span>D, Standing position


hope this helps u 
have a good day</span>
You might be interested in
When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
Sergeeva-Olga [200]

Explanation:

Here's my solution:

import java.util.Scanner; // We start by importing the Scanner, which enables us to put in values

public class Main // our class. Name doesn't really matter here.

{ // Open the brackets of the class.

   

public static void main(String[] args) { // This is our main method. It will run when we run the class.

    System.out.println("Starting Taffy Timer..."); // When we start the timer, we will print out that we do so

 Scanner re = new Scanner(System.in); // Import the scanner into the main method

 int temp; // Define the integer called temperature that the user will put in

 do { /* This is a do while loop -- it will go through the loop, and then it will check the value.

      I decided to use this because we can define temperature without checking the value first.

     What this loop is doing is taking in the temperature, and then checking if it's right. If

     it's a high enough temperature, it will tell the user that it's ready, but if not, it won't. */

     temp = re.nextInt(); // Allow the user to enter in the temperature

     if(temp >= 270) { // if it's high enough, say that it's ready

         System.out.println("Your taffy is ready for the next step!");

         

     }

     else { // if not, don't

          System.out.println("The mixture isn't ready yet.");

         

     }

 }

 while(temp < 270); // This makes sure that if it's ready for the next step, we don't have to continue

}

}

5 0
3 years ago
If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
Free_Kalibri [48]

The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations  without knowing that is any form of administrative change.

<h3>What Does Administrative Privileges Mean?</h3>

The term Administrative privileges are known to be the ability to have or create some major changes to any given system, such as an operating system.

Note that based on the above, The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations  without knowing that is any form of administrative change.

Learn more about administrator privileges from

brainly.com/question/26389124

#SPJ1

8 0
1 year ago
How can an individual find career data?
kolezko [41]
How can an individual find career data?a. using a libraryb. searching the webc. conducting an interview with someone in a particular fieldd. all answer choices are sources for finding career data?The answer is d. An individual can do all the option a, b, and c to find a better career data.
6 0
3 years ago
Which of these is a popular format for citing sources in academic Works RAM APA CPU or EDU
Lelechka [254]

Answer:

APA

Explanation:

6 0
3 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • Which forensics tool would you use to reveal recent pages viewed via the internet explorer browser?
    10·1 answer
  • In the United States, everyone is guaranteed work true or false
    13·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • Complete the following table.
    6·1 answer
  • When a hoverboard's battery dies, does the hoverboard battery life get impacted the next time the battery is full?
    12·1 answer
  • Describe the scope of the variables in this code.
    8·2 answers
  • What is the purpose of a project overview?
    8·2 answers
  • (C) Describe about the different types of computer<br> peripherals and memory devices.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!