1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
14

Where are all my smart ppl at? Help me out!!!

Computers and Technology
2 answers:
Kruka [31]3 years ago
7 0

Answer:

ANSWER IS A2+B3

Explanation:

i am shmart.

ohaa [14]3 years ago
5 0

Answer:

Most def B.

Explanation:

Hope this helped

You might be interested in
Georgenotfound??? question mark??
Arlecino [84]

Answer:

hi

Explanation:

8 0
4 years ago
Read 2 more answers
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
il63 [147K]

The security policy that can be implemented to prevent removable media from automatically launching potentially harmful programs is Disable AutoRun.

<h3>Why should one disable AutoRun?</h3>

The Autorun is known to be a system function that often launches every time, and as such, it renders your system to be open to viruses, malwares, trojans etc.

Conclusively, The act of Disabling the autorun feature is one that can hinder malware from spreading in your system.

Learn more about computer from

brainly.com/question/24540334

4 0
3 years ago
Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
Dovator [93]

Answers with Explanation:

A. Give at least two reasons why he believes this.

Friedman believes that health promotion based on Western framework for human development<em> unfairly criticizes the other cultures in the society.</em> Western framework values intellectual and economic achievements alone, which then <em>results to putting a great expense on the other essential human qualities.</em>

B. What crisis does he believe is happening in the most economically developed countries?

The crisis that is happening in the most economically developed country is the <em>devaluing of the other aspects which other human beings value in terms of individuality or families.</em>

C. What does he recommend to improve the programming for adolescent health?

He recommends that if changes were to be implemented for adolescent's health, <u>these have to be properly assessed regarding their effect on the adolescent's development,</u> including his/her family and other social relationships. Next is to check whether<u> it doesn't conflict with the adolescent's culture in the community that he belongs</u>. If it does, then it is essential to change it or find <em>another way which fosters</em><em> </em><em>the same goal.</em>

7 0
3 years ago
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
What are the five types of alignment in Word?
Basile [38]
There are four types of alignment in word.
Left-aligned text
Right-aligned text
Center-aligned text
Justified text
6 0
4 years ago
Read 2 more answers
Other questions:
  • In one to three sentences describe one reason you would import data into a datebase
    13·1 answer
  • All web traffic is based on the ____________________ protocol.
    14·1 answer
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    11·1 answer
  • Give one example of a civil engineering structure.
    5·1 answer
  • What is a row of data in a database called?<br> Field<br> File<br> Record<br> Title
    10·1 answer
  • Mobile cameras are now of a higher quality than when they first arrived on the market. Describe the difference in
    5·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
  • # input a mark in a subject of a student and
    9·1 answer
  • In Super Mario 64, a character called Lakitu follows Mario around on a cloud, filming him with a camera as though he were shooti
    8·2 answers
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!