Answer:
1. Pedestrians - Most of pedestrians use to walk on the footpath along side road that keeps them on a safe side. But there are places without footpath along side road, in that case they have to walk on the road itself. Here, we need to take care for them. We need to wait in case they are crossing road and also check for them while taking a turn.
2. Cyclists - They travel on road but are tough to figure out. They travel at a slower pace compared to cars. To avoid any accident with them, we are supposed to give them enough space which should be equivalent to a car's space.
3. Motorcyclists - They can pass by very closely and also come between lanes. Most of the things to be considered here are same as that of cyclists. Here also, we need to check for them carefully while taking a turn. Also, need to give them enough space.
Explanation:
The three safe driving skills are "Pedestrians, Cyclists, and Motorcyclists" which can be defined as follows:
Pedestrians:
They are protected by walking on a walkway that runs alongside a busy street. If a roadside pathway does not exist, walkers must cross there. These people require special attention. While changing direction, we need to watch for intruders.Cyclists:
They go via road, but they are hard to identify. Compared to a car, bicycles go at a much slower pace. They should be given a certain amount of space as a car to avoid collision.Motorcyclists:
They are able to pass quite closely and in the middle of lanes. There are several of the same considerations that cyclists must make while planning a visit. In this case, we must likewise be very careful about taking a turn. Also, animals need enough room.Learn more:
safe driving skill: brainly.com/question/4493778
What action demonstrates unethical behavior?
A.
working overtime
B.
completing your work ahead of time
C.
taking credit for another person’s work
D.
keeping a tab on your organization’s carbon footprint
E.
leaving office on time
Answer:
taking credit for another person’s work
Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
What is Unethical behavior?When a person, a professional, or an industry acts in a way that is deemed unethical because it goes against social norms, that behavior is referred to as unethical behavior.
Politicians, businesses, professions, and individuals all have the potential to act unethically.
There are other instances of deliberate deception, but they serve as illustrations of how damaging deception can be when it is used to violate someone's rights or security.
Therefore, Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
To learn more about Unethical, refer to the link:
https://brainly.com/question/10174825
#SPJ2
What are possible challenges of cyberbullying
Answer:
so,e challenges of cyber bullying is that,it could be a random person bullying u and u won't know who it is,another challenge of cyber bullying is that they can blackmail u or pretend to be u or threaten u
Answer:
Possible challenges of cyberbullying have to do with nonbelievers, or people who do not think cyberbullying is a real problem. Technology makes it hard to stop bullies, and some people do not want to take responsibility.
how do you give brianliest
Answer:
When you ask a question in brainly, two helpers will answer it, then on each answerer you'll find "mark as brainliest" button which looks like a crown.
Hope this helps :)
Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
A.
popular pizza chains in the world
B.
most popular AND pizza chains AND worldwide AND 2019
C.
the most popular pizzas “in the world today” AND 2019 AND chains
D.
2019 worldwide pizza chains “most popular in the world”
Answer:
D
Explanation:
Why can the internet keep growing as more devices are added without decrease in performance?
Answer:
Explanation:
There may be many reasons why your internet speed is slow. Internet use requires a reliable connection between your device and the destination, which may be a server that is physically located on the other side of the world.Your connection to that server could pass through hundreds of devices on its journey. Each one of these is a potential failure, or weak point. If one point along this path isn’t functioning optimally, this can significantly affect your internet experience.
What are some options available in the Spelling and Grammar Checker? Check all that apply.
Redo
Undo
Ignore All
Ignore Once
AutoFormat
Add to Dictionary
Readability statistics
Answer:
ignore all
ignore once
add to dictionary
Explanation:
took the assignment on edge2020
Which function will find the difference of 15 and 3 and return 12 when the main part of your program has the following line of code?
answer = subtract(15,3)
def Subtract(numA, numB):
return numA - numB
def Subtract(numA, numB):
return numB - numA
def subtract(numA, numB):
return numA - numB
def subtract(numA, numB):
return numB - numA
Answer:def subtract(numA, numB):
return numA - numB
Explanation:
i got the right answer but i was willing to get it wrong for the right anwser for you
The function that will find an accurate difference of 15 and 3 and return 12 when the main part of your program has the following line of code is as follows:
def subtract(numA, numB):return numA - numB
Thus, the correct option for this question is C.
What is the significance of the output of the program?The significance of the output of the program is understood by the fact that it delivers some values or concepts to the user with respect to the instruction he/she is given to the computer for processing. The output of the program is very specific in nature.
According to the question, you have to assume the value of number A as 15 and number B as 3. So, when you find the difference between these numbers, you get an output of 12.
You must follow the process as follows while framing a program:
def subtract(numA, numB):return numA - numB
Therefore, the correct option for this question is C.
To learn more about Output of a program, refer to the link:
https://brainly.com/question/18079696
#SPJ2
Before he buys a new smartphone, Tim can best use data to
evaluate which phone he should get.
convince himself he wants a phone.
discredit others’ opinions on his phone choice.
recognize problems that all phones have.
Answer:
A.) Evaluate which phone he should get
Explanation:
Edge2020
Select the protocol data units.
1. Bit
2. Segment
3. Frame
4. Data
5. Spoof
6. Pin
7. Packet
Answer: 4. Data 2. segment 7.packet 3.frame 1.bit
Explanation:
Answer:
segmet bit packet frame data
Explanation:
What does a coder do on a daily basis?
medical charts and assinging codes
Question # 6
Math Formula
What is the output of this program? Assume the user enters 2, 5, 1, and 6.
numA = 0
for count in range(4):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Answer:
14.0
Explanation:
The loop converts each answer to a float. The accumulator variable adds the values entered.
2.0 + 5.0 + 1.0 + 6.0 = 14.0
Answer:
14.0
Explanation:
Edge 2021
Select the correct answer.
What is a hyperlink?
A.
A bold link that goes back to a newspaper
B.
A link that clicks on itself
C.
A way to cite sources in an online article
D.
A special link on a smartphone
Answer:
c.
Explanation:
a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
Answer:
c
Explanation:
came out my study guide and i made a 96 % on my 50 question test
any song recommendations, pls dont say 6ix9ine or lil pump
I actually do have one tho. Try Megan Tha Stallion.
Answer:
smash mouth "all star" is my fave or Imagine Dragons "Whatever it Takes"
Explanation:
The ideal hash function:
A. Should be unfeasible to find two inputs that map to the same output
B. Should be unfeasible to learn anything about the input from the output
C. Basically we don’t want people to figure out what was said
D. All the above
Which statement is true? Select 3 options.
A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.
Answer:
A,C, AND E
Explanation:
i got it wrong for the anwser
The statements that are true are as follows:
A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.Thus, the correct options for this question are A, C, and E.
What is Function?A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.
Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.
Therefore, the correct options for this question are A, C, and E.
To learn more about Functions, refer to the link:
https://brainly.com/question/22340031
#SPJ2
Part B
How would you classify a network formed by connecting two MANs together?
В І у хх Font Sizes А • А
what is a cloud in the world of computing
Answer:
In the simplest terms, cloud computing means storing and accessing data and programs over the internet instead of your computer's hard drive
Explanation:
Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I really need a quick and correct response. Pls support.
Answer:
i think its 3337
Explanation:
BRAINLIEST
When using design templates, these elements will be determined for you.
bullets
background
color scheme
content
title
font
Answer:
background
color scheme
font
I think thats all
Explanation:
Please give me Brainly
When using design templates, the elements that will be determined for you are color scheme and background. The correct options are b and c.
What is designing a template?The template is creating a document that has a copy of itself. Design templates are ready-made layouts and written materials that can be altered. For example, if you have a template of office content, then you can use it for another word document. You don't have to start from scratch.
In order to maintain consistency among users and media, templates are frequently created to adhere to certain rules or specifications. You can make new templates for later use, or utilize pre-designed templates from template libraries and websites.
Therefore, the correct options are b, background, and c, color scheme.
To learn more about template, refer to the link:
https://brainly.com/question/28193778
#SPJ2
Anyone have an answer for 4.9 lesson code practice
Answer:
loop
Explanation:
Answer:count
Explanation:
Which item cannot be inserted into a header or footer of a document?
Answer:
All the above items can be inserted into either a header or a footer.
Please mark brainliest!
The items that cannot be inserted into a header or footer of a document is all the above items can be inserted into either a header or a footer. The correct option is d.
A document is a type of information that can be stored electronically. Page numbers are generated automatically. Tables with columns and rows, pictures, shapes, and clipart can all be inserted into a document's header or footer. As a result, all of the items listed above can be inserted into the header or footer.
A header is text at the top of a page, whereas a footer is text at the bottom, or foot, of a page. Typically, these spaces are used to input document information such as the document's name, chapter heading, page numbers, creation date, and so on.
Therefore, the correct option is d, All the above items can be inserted into either a header or a footer.
To learn more about the header or footer, refer to the link:
https://brainly.com/question/4637255
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Automatic page numbers
Tables with columns and rows
Pictures, shapes, and clipart.
All the above items can be inserted into either a header or a footer.
Which of the following You tubers uses the word "flip" as a curse word
A. Unspeakable
B.09Sharkboy
C. Moosecraft
D. All of the above
First correct answer get brainiest!
agree and tell why becoming a priest/nun is an honorable job PLEASE ASAP
girls question
who wants to go out ;p
Answer: I do
Explanation: *P.S.* I'm a Boy
A peripheral can be used to tell a computer to complete a specific task.
A) True
B)False
Answer:
A. true
Explanation:
because you can complete it without it mistakes if your using an computer but if you use an paper you will make mistakes over and over
What is the difference between soft copy output devices and hard copy output devices
the output printed on the paper is called hardcopy output. some examples are printer and plotter.
the output produced on display screen and audio sound is called soft copy output. some examples are moniter and speaker.
How did New York Governor Hugh Carey handle Sostre’s situation?
Answer:
The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.
Explanation:
Answer:
The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.
Explanation:
correct on e2020 Dawg
Which of this isn't one of the three types of cryptograph?
A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing
Answer:
A. Vegenere
Explanation:
I think it's spelled Vigenère, I might be wrong.
The three types of cryptograph are:
Symmetric Key Cryptography (Private/Secret Key Cryptography)
Asymmetric Key Cryptography (Public Key Cryptography)
Hash Function
Collisions occur when one output is mapped to two inputs.
A. True
B. False
Answer:
true very true very true
Answer:
False
Explanation:
I honestly just guess ngl
but i believe it's right ;0
look at the picture lol
Answer:
Zoom in more please and than i can help
Explanation:
Answer:
I would go with the first blue highlighted one... but i could be wrong
i hope i helped
if i didn't... i am sorry, i tried.