Had you guys go to prom by yourself or someone in your senior class

Answers

Answer 1
Answer:

Answer: I didn’t have a “date”, I went with friends.

Answer 2
Answer:

Answer:

by myself

Explaination: Iḿ not the social type


Related Questions

True or False? The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.
An example of hardware is a _____.database spreadsheet monitor program used to enhance photos
Two or more computers connected together is referred to as a(n)A. software program.c. hard drive.B. network.d. CPU.
1.How does inertia affect a person who is not wearing a seatbelt during a collision? 2.How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at 60 mph?3.How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?4.Keeping in mind the kinetic energy of a moving vehicle, how can a driver best prepare to enter sharp curves in the roadway?5.Using information about natural laws, explain why some car crashes produce minor injuries and others produce catastrophic injuries.
One problem with using e-mail is that ______.a. People will think you are a nerd if you use e-mailb. E-mail is considered too formal for most communicationc. Once e-mail is sent out, it cannot be taken backd. E-mail is expensive to use and maintain

Computer piracy occurs when what is violated

Answers

When intellectual property or copyright laws are violated. (Has to be with computer-related things)

Janeen is concerned because the computer system did not upload the entries made the previous day.

Answers

there are various possible reasons why the file that she is trying to upload is not uploading in her computer. FIrst maybe the internet connection is too slow or disconnected. Second, maybe the file is too big and lastly, the computer needs a restart 

Which of the following is the most appropriate wireless networking standard for creating personal area networks?a. Wi-Fi
b. Cellular radio
c. Microwave
d. Bluetooth

Answers

A . Wi-Fi

The routers are easier to manage and work well. It supports a Large range of devices simultaneously. Bluetooth has to short range, cellular radio is very uncommon and microwave is also. The majority of personal area network these days are WIFi due to it's convenience and ease of use .

 - hOpe this helps IF THIS DIDN'T HELP THEN COMMENT IN THE COMMENT SECTION BELOWW↓↓ IF WRONG TELL ME . THANKS ,

Answer:

wifi

Explanation:

When making college visits, you may be able to?

Answers

When making college visits, you may be able to see have an idea and observe of how college life would be like, what the campuses look like, how the environment appears to be, and how the students would behave inside. Making college visits also gives you some prospect on what programs you want to take and the ones that would best suit you.

Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Which of the following information security goals can be achieved by implementing countermeasures that would help prevent business partners from denying ever receive emails that were sent to them

Answers

Answer:

Availability Goal

Explanation:

In Information Security, Countermeasures intended to ensure the uninterrupted availability of data and resources for authorized use promote  the "Availability Goal".

The Availability goal is one of the the three main goals of Confidentiality, Integrity and Availability espoused within the CIA model of Information Security measures. Redundancy and Fault tolerance are means within the Availability model intended to mitigate against incidents like Denial of service (DoS), Loss of information system and Equipment failures, incidents that could all mean data and resource unavailability.

Answer:

Non repudiation.

Explanation:

Information security is a concept in information technology, whereby access to information, transmission and use of data are controlled for security purposes.

The access control countermeasures are preventive features to prevent access to information systems by attackers.

Non repudiation is an information security access control feature that prevents partners in business from denying emails delivered and signatures.

What is the operation of an earth leakage tester

Answers

In any electrical installation, some current will flow through the protective ground conductor to ground. This is usually called leakage current. Leakage current most commonly flows in the insulation surrounding conductors and in the filters protecting electronic equipment around the home or office. So what's the problem? On circuits protected by GFCIs (Ground Fault Current Interrupters), leakage current can cause unnecessary and intermittent tripping. In extreme cases, it can cause a rise in voltage on accessible conductive parts.