1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
14

_______ is the lightest chemical element A.oxygen B.hydrogen C.helium

Computers and Technology
2 answers:
Oksanka [162]3 years ago
6 0
B. Hydrogen because it has an atomic number of 1 and molar mass of 1
Paladinen [302]3 years ago
6 0
I think it is B. my answer must be 20 characters ignire this
You might be interested in
Create a cell array containing the same data as above (Do not use built-in functions such as cell2array, struct2cell, etc. but u
Anna71 [15]

Answer:

clc;

clear all;

disp('Creating the cell arr of required values')

arr = { 'Alejandro', 11, {3 5 7 9}, {0 0}, 'UCSD2016';...

{8 6 4 2 0 -2}, pi, 'Stephanie', {1 0}, {'(858) 273-0173'} }

disp('First row second column')

exp1 = arr(1 : 2, 2)

disp('Third element of 2nd row 1st column')

exp2 = arr{2, 1}(1,3)

disp('Deleting last 2 elements of 1st row 2nd column')

arr{1, 3}(3:4) = []

disp('log of 2nd row 2nd column')

arr{2, 2} = log(arr{2, 2})

disp('Swapping 1st row 1st column with 2nd row 3rd column')

temp = arr{2, 3};

arr{2, 3} = arr{1, 1}

arr{1, 1} = temp

disp('Deleting 2nd row 1st column elements')

arr{2, 1}(1:6)=[]

disp('Deleting third column')

arr(:,3) = []

6 0
3 years ago
You have just taken over management of a server on which the previous server administrator has set up several server components,
Arisa [49]

Answer:

d. Ensure file caching and flushing are enabled for all disk drives.

Explanation:

When the disk reading and writing is delayed and the server performance is also slow after taking over management of a server.Previously the server has several server components.So to increase the performance we should ensure caching of the file and make sure that the flushing is enabled for all disk drives.Hence the answer to this question is option d.

8 0
3 years ago
Consider the code below. Note that the catch statements in the code are not implemented, but you will not need those details. As
Dmitriy789 [7]

Missing Part of Question

An exception raised by the instruction in i3 would be caught by the catch statement labeled?

Answer:

e3 and e4.

Explanation:

The instruction tag i3 points to the following code segment

a[++i] = (double) (1 / x); // i3

The code segment above performs arithmetic operation (double)(1/x)

And then assigns the value of the arithmetic operations to an array element a[++I]

It's possible to have one or both of the following two exceptions.

1. Error in Arithmetic Operation

2. Index of Array out of bound

These are both represented in exception tags e3 and e4

catch (ArithmeticException ex) {...} // e3

catch (ArrayIndexOutOfBounds ex) {...} // e4

Exception e3 can arise when the program try to carry out invalid arithmetic operation.

For instance, 1/0 or 0/0.

This will lead to ArithmeticException to be thrown

Exception e4 can arise when the program tries to assign values to an index that's not in an array.

Say, the total index in a given array a is 5.

The index of this array is 0 to 4; i.e. a[0] to a[4]

The moment the program tries to assign values to array element other than the ones I listed above (e.g a[5]) ArrayIndexOutOfBounds exception will be thrown

6 0
3 years ago
Help me with this…… please
Brums [2.3K]

Answer:

2. The texture is being use to look sturdy

3. some repetition are being repeated for example the blocks

4. No it because of the words

5. The words at the bottom

It my opinion so it might not be correct

8 0
2 years ago
What term refers to a hacker that uses
miss Akunina [59]

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

5 0
2 years ago
Other questions:
  • To indent the first line of a paragraph which key should you use
    13·2 answers
  • Manipulate the SQL statement to pull ALL fields and rows from Customers table that have a PostalCode of 44000. TIP: Since Postal
    13·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
    8·1 answer
  • What is metrical task system algorithm?? and can we use that in online shopping project??
    11·1 answer
  • When you purchase an item in a store, you may be charged __________.
    11·2 answers
  • If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement bi
    7·1 answer
  • A sequence of direct connections
    10·1 answer
  • Why are digital signals an accurate and reliable way to record and send information?
    13·1 answer
  • A Software Developer wants to add a new feature to an existing application operating in the Cloud, but only wants to pay for the
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!