1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
2 years ago
11

What could happen if we cannot save the life​

Computers and Technology
2 answers:
padilas [110]2 years ago
8 0

Answer:

If we could not save the people or animals life they would die

Explanation:

babymother [125]2 years ago
4 0
Be more specific please, what life?
You might be interested in
What type of device is characteristic of an enterprise environment? Question 14 options: a) A workstation used by a retired pers
sertanlavr [38]

Answer:

A workstation used at an engineering firm is characteristic of an enterprise environment.

4 0
3 years ago
Why won't my ads load brainly? Is anyone else having this problem? Brainly company or whoever you are that is running this websi
djverab [1.8K]

No I have not had that do that to me before It has always loaded my ads and sent me right back to the answer

7 0
3 years ago
Read 2 more answers
True or false :Beyond fulfilling legal obligations, a diverse workplace offers many other benefits as well.
KengaRu [80]
The answer to your question is true.
7 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Which aspect of design theory describes the relationship of one object to another in size? A.value B.form C.proportion D.tecture
pashok25 [27]

Answer:

<u>Proportion </u>is the aspect in design theory that describe the relationship of one object to another object in size.

Explanation:

Proportion is an important aspect in design theory in terms of size. It refers to the relationship between object of the design in terms of size. The relation between size of different object in design theory can describe as, if the size of one object increases or decreases, it may leads to change in size of other object. It is called proportion.

If the size of one object increase with the size of other object, the relation is called direct proportion. If the size of one object decrease with the increase in size of other object is called inverse proportion.

7 0
3 years ago
Other questions:
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • True or false: Sony is the company behind the creation of the ‘Super Mario Bros.' franchise.
    8·2 answers
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • One is FPGA and other is ASIC. Budget, power consumption, and speed are the common parameters considered for the selection of th
    9·1 answer
  • On the first line, place your name in a comment. Create a program that does the following: Take in three integer numbers from th
    5·1 answer
  • What HTML tag would you use to indicate a line break?
    5·1 answer
  • State 4 basic operation performed by a computer​
    11·2 answers
  • What are some examples of productions categorized as non-broadcast productions?
    6·1 answer
  • What does a companys code of ethics cover
    8·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!